Логотип exploitDog
bind:"CVE-2017-18208" OR bind:"CVE-2017-5715" OR bind:"CVE-2019-6133" OR bind:"CVE-2018-7191"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-18208" OR bind:"CVE-2017-5715" OR bind:"CVE-2019-6133" OR bind:"CVE-2018-7191"

Количество 174

Количество 174

oracle-oval логотип

ELSA-2019-4710

почти 6 лет назад

ELSA-2019-4710: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2017-18208

больше 7 лет назад

The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2017-18208

больше 7 лет назад

The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2017-18208

больше 7 лет назад

The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2017-18208

больше 7 лет назад

The madvise_willneed function in mm/madvise.c in the Linux kernel befo ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-85g2-5cqr-rm5c

около 3 лет назад

The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1080-1

около 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0986-1

около 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2017-5715

больше 7 лет назад

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVSS3: 5.6
EPSS: Критический
redhat логотип

CVE-2017-5715

больше 7 лет назад

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVSS3: 5.6
EPSS: Критический
nvd логотип

CVE-2017-5715

больше 7 лет назад

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVSS3: 5.6
EPSS: Критический
debian логотип

CVE-2017-5715

больше 7 лет назад

Systems with microprocessors utilizing speculative execution and indir ...

CVSS3: 5.6
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2018:0785-1

около 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0781-1

около 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0786-1

около 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2019-6133

больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 6.7
EPSS: Низкий
redhat логотип

CVE-2019-6133

больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2019-6133

больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 6.7
EPSS: Низкий
debian логотип

CVE-2019-6133

больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism ...

CVSS3: 6.7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2237-1

почти 7 лет назад

Security update for kernel-firmware

EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2019-4710

ELSA-2019-4710: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 6 лет назад
ubuntu логотип
CVE-2017-18208

The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

CVSS3: 5.5
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2017-18208

The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

CVSS3: 5.5
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2017-18208

The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

CVSS3: 5.5
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2017-18208

The madvise_willneed function in mm/madvise.c in the Linux kernel befo ...

CVSS3: 5.5
0%
Низкий
больше 7 лет назад
github логотип
GHSA-85g2-5cqr-rm5c

The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

CVSS3: 5.5
0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2018:1080-1

Security update for the Linux Kernel

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0986-1

Security update for the Linux Kernel

около 7 лет назад
ubuntu логотип
CVE-2017-5715

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVSS3: 5.6
91%
Критический
больше 7 лет назад
redhat логотип
CVE-2017-5715

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVSS3: 5.6
91%
Критический
больше 7 лет назад
nvd логотип
CVE-2017-5715

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVSS3: 5.6
91%
Критический
больше 7 лет назад
debian логотип
CVE-2017-5715

Systems with microprocessors utilizing speculative execution and indir ...

CVSS3: 5.6
91%
Критический
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0785-1

Security update for the Linux Kernel

около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0781-1

Security update for the Linux Kernel

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0786-1

Security update for the Linux Kernel

около 7 лет назад
ubuntu логотип
CVE-2019-6133

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 6.7
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-6133

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 7.3
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-6133

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 6.7
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-6133

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism ...

CVSS3: 6.7
0%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2237-1

Security update for kernel-firmware

91%
Критический
почти 7 лет назад

Уязвимостей на страницу