CVE-2017-7541
- EPSS 0.04%
- Veröffentlicht 25.07.2017 04:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a ...
- EPSS 0.07%
- Veröffentlicht 24.07.2017 07:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds ...
CVE-2017-7542
- EPSS 0.07%
- Veröffentlicht 21.07.2017 16:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.
CVE-2017-1000363
- EPSS 0.54%
- Veröffentlicht 17.07.2017 13:18:18
- Zuletzt bearbeitet 13.05.2026 00:24:29
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, wher...
CVE-2017-11176
- EPSS 20.81%
- Veröffentlicht 11.07.2017 23:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possi...
CVE-2017-10911
- EPSS 0.05%
- Veröffentlicht 05.07.2017 01:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized paddin...
CVE-2017-1000364
- EPSS 3.09%
- Veröffentlicht 19.06.2017 16:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the...
CVE-2017-1000365
- EPSS 0.33%
- Veröffentlicht 19.06.2017 16:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass...
CVE-2017-1000370
- EPSS 1.72%
- Veröffentlicht 19.06.2017 16:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The offset2lib patch as used in the Linux Kernel contains a vulnerability that allows a PIE binary to be execve()'ed with 1GB of arguments or environmental strings then the stack occupies the address 0x80000000 and the PIE binary is mapped above 0x40...
CVE-2017-1000371
- EPSS 2.16%
- Veröffentlicht 19.06.2017 16:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as t...