Количество 174
Количество 174
ELSA-2019-4710
ELSA-2019-4710: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2017-18208
The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

CVE-2017-18208
The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

CVE-2017-18208
The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
CVE-2017-18208
The madvise_willneed function in mm/madvise.c in the Linux kernel befo ...
GHSA-85g2-5cqr-rm5c
The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

SUSE-SU-2018:1080-1
Security update for the Linux Kernel

SUSE-SU-2018:0986-1
Security update for the Linux Kernel

CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indir ...

SUSE-SU-2018:0785-1
Security update for the Linux Kernel

openSUSE-SU-2018:0781-1
Security update for the Linux Kernel

SUSE-SU-2018:0786-1
Security update for the Linux Kernel

CVE-2019-6133
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVE-2019-6133
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVE-2019-6133
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
CVE-2019-6133
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism ...

openSUSE-SU-2018:2237-1
Security update for kernel-firmware
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2019-4710 ELSA-2019-4710: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 6 лет назад | |||
![]() | CVE-2017-18208 The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping. | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2017-18208 The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping. | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2017-18208 The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping. | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад |
CVE-2017-18208 The madvise_willneed function in mm/madvise.c in the Linux kernel befo ... | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад | |
GHSA-85g2-5cqr-rm5c The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2018:1080-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | SUSE-SU-2018:0986-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | CVSS3: 5.6 | 91% Критический | больше 7 лет назад |
![]() | CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | CVSS3: 5.6 | 91% Критический | больше 7 лет назад |
![]() | CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | CVSS3: 5.6 | 91% Критический | больше 7 лет назад |
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indir ... | CVSS3: 5.6 | 91% Критический | больше 7 лет назад | |
![]() | SUSE-SU-2018:0785-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | openSUSE-SU-2018:0781-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | SUSE-SU-2018:0786-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | CVE-2019-6133 In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c. | CVSS3: 6.7 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2019-6133 In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c. | CVSS3: 7.3 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2019-6133 In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c. | CVSS3: 6.7 | 0% Низкий | больше 6 лет назад |
CVE-2019-6133 In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism ... | CVSS3: 6.7 | 0% Низкий | больше 6 лет назад | |
![]() | openSUSE-SU-2018:2237-1 Security update for kernel-firmware | 91% Критический | почти 7 лет назад |
Уязвимостей на страницу