Количество 187
Количество 187
ELSA-2014-3048
ELSA-2014-3048: unbreakable enterprise kernel security update (IMPORTANT)
ELSA-2014-3047
ELSA-2014-3047: unbreakable enterprise kernel security update (IMPORTANT)
ELSA-2014-0924
ELSA-2014-0924: kernel security update (IMPORTANT)
ELSA-2014-0923
ELSA-2014-0923: kernel security update (IMPORTANT)
ELSA-2014-3049
ELSA-2014-3049: unbreakable enterprise kernel security update (IMPORTANT)
ELSA-2014-3046
ELSA-2014-3046: unbreakable enterprise kernel security update (IMPORTANT)

CVE-2014-4943
The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.

CVE-2014-4943
The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.

CVE-2014-4943
The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
CVE-2014-4943
The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel throug ...
GHSA-8xp6-4x45-vm77
The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.

CVE-2014-4699
The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

CVE-2014-4699
The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

CVE-2014-4699
The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.
CVE-2014-4699
The Linux kernel before 3.15.4 on Intel processors does not properly r ...
GHSA-j6mr-2j2f-gxh9
The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

BDU:2016-01579
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

SUSE-SU-2015:1376-1
Security update for Linux kernel

SUSE-SU-2015:0736-1
Security update for Linux kernel

SUSE-SU-2015:1174-1
Security update for Linux kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2014-3048 ELSA-2014-3048: unbreakable enterprise kernel security update (IMPORTANT) | около 11 лет назад | |||
ELSA-2014-3047 ELSA-2014-3047: unbreakable enterprise kernel security update (IMPORTANT) | около 11 лет назад | |||
ELSA-2014-0924 ELSA-2014-0924: kernel security update (IMPORTANT) | около 11 лет назад | |||
ELSA-2014-0923 ELSA-2014-0923: kernel security update (IMPORTANT) | около 11 лет назад | |||
ELSA-2014-3049 ELSA-2014-3049: unbreakable enterprise kernel security update (IMPORTANT) | около 11 лет назад | |||
ELSA-2014-3046 ELSA-2014-3046: unbreakable enterprise kernel security update (IMPORTANT) | около 11 лет назад | |||
![]() | CVE-2014-4943 The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket. | CVSS2: 6.9 | 1% Низкий | около 11 лет назад |
![]() | CVE-2014-4943 The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket. | CVSS2: 7.2 | 1% Низкий | около 11 лет назад |
![]() | CVE-2014-4943 The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket. | CVSS2: 6.9 | 1% Низкий | около 11 лет назад |
CVE-2014-4943 The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel throug ... | CVSS2: 6.9 | 1% Низкий | около 11 лет назад | |
GHSA-8xp6-4x45-vm77 The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket. | 1% Низкий | больше 3 лет назад | ||
![]() | CVE-2014-4699 The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. | CVSS2: 6.9 | 1% Низкий | около 11 лет назад |
![]() | CVE-2014-4699 The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. | CVSS2: 6.9 | 1% Низкий | около 11 лет назад |
![]() | CVE-2014-4699 The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. | CVSS2: 6.9 | 1% Низкий | около 11 лет назад |
CVE-2014-4699 The Linux kernel before 3.15.4 on Intel processors does not properly r ... | CVSS2: 6.9 | 1% Низкий | около 11 лет назад | |
GHSA-j6mr-2j2f-gxh9 The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. | 1% Низкий | больше 3 лет назад | ||
![]() | BDU:2016-01579 Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии | CVSS2: 6.9 | 1% Низкий | около 11 лет назад |
![]() | SUSE-SU-2015:1376-1 Security update for Linux kernel | почти 11 лет назад | ||
![]() | SUSE-SU-2015:0736-1 Security update for Linux kernel | почти 11 лет назад | ||
![]() | SUSE-SU-2015:1174-1 Security update for Linux kernel | почти 11 лет назад |
Уязвимостей на страницу