The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.0 | 7.4 | HIGH | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
Primary | 2.0 | 6.1 | MEDIUM | AV:A/AC:L/Au:N/C:N/I:N/A:C |
CWE ID | Type | Source |
---|---|---|
CWE-754 | Primary | nvd@nist.gov |
Hyperlink | Source | Resource |
---|---|---|
http://www.openwall.com/lists/oss-security/2017/12/04/2 | cve@mitre.org | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/102038 | cve@mitre.org | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2018:0676 | cve@mitre.org | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:1062 | cve@mitre.org | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:1170 | cve@mitre.org | N/A |
https://access.redhat.com/security/cve/cve-2017-1000407 | cve@mitre.org | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html | cve@mitre.org | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3583-1/ | cve@mitre.org | Third Party Advisory |
https://usn.ubuntu.com/3583-2/ | cve@mitre.org | Third Party Advisory |
https://usn.ubuntu.com/3617-1/ | cve@mitre.org | Third Party Advisory |
https://usn.ubuntu.com/3617-2/ | cve@mitre.org | Third Party Advisory |
https://usn.ubuntu.com/3619-1/ | cve@mitre.org | Third Party Advisory |
https://usn.ubuntu.com/3619-2/ | cve@mitre.org | Third Party Advisory |
https://usn.ubuntu.com/3632-1/ | cve@mitre.org | Third Party Advisory |
https://www.debian.org/security/2017/dsa-4073 | cve@mitre.org | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4082 | cve@mitre.org | Third Party Advisory |
https://www.spinics.net/lists/kvm/msg159809.html | cve@mitre.org | Patch |
http://www.openwall.com/lists/oss-security/2017/12/04/2 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/102038 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2018:0676 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:1062 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:1170 | af854a3a-2127-422b-91ae-364da2661108 | N/A |
https://access.redhat.com/security/cve/cve-2017-1000407 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3583-1/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://usn.ubuntu.com/3583-2/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://usn.ubuntu.com/3617-1/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://usn.ubuntu.com/3617-2/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://usn.ubuntu.com/3619-1/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://usn.ubuntu.com/3619-2/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://usn.ubuntu.com/3632-1/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://www.debian.org/security/2017/dsa-4073 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4082 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://www.spinics.net/lists/kvm/msg159809.html | af854a3a-2127-422b-91ae-364da2661108 | Patch |