Логотип exploitDog
bind:"CVE-2018-17972" OR bind:"CVE-2019-1125" OR bind:"CVE-2019-5489" OR bind:"CVE-2017-17805"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-17972" OR bind:"CVE-2019-1125" OR bind:"CVE-2019-5489" OR bind:"CVE-2017-17805"

Количество 84

Количество 84

oracle-oval логотип

ELSA-2019-2473

почти 6 лет назад

ELSA-2019-2473: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4541

больше 6 лет назад

ELSA-2019-4541: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2018-17972

больше 6 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2018-17972

больше 6 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 3.3
EPSS: Низкий
nvd логотип

CVE-2018-17972

больше 6 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2018-17972

больше 6 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base ...

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1692-1

почти 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1533-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14089-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
github логотип

GHSA-qgp4-5xqg-pc3p

около 3 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2019-00570

больше 6 лет назад

Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1534-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1532-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1527-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4531

больше 6 лет назад

ELSA-2019-4531: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-0512

больше 6 лет назад

ELSA-2019-0512: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2019-1125

почти 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a...

CVSS3: 5.6
EPSS: Средний
redhat логотип

CVE-2019-1125

почти 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.9
EPSS: Средний
nvd логотип

CVE-2019-1125

почти 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a

CVSS3: 5.6
EPSS: Средний
msrc логотип

CVE-2019-1125

почти 6 лет назад

Windows Kernel Information Disclosure Vulnerability

CVSS3: 5.6
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2019-2473

ELSA-2019-2473: kernel security and bug fix update (IMPORTANT)

почти 6 лет назад
oracle-oval логотип
ELSA-2019-4541

ELSA-2019-4541: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
ubuntu логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 3.3
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base ...

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1692-1

Security update for the Linux Kernel

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1533-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14089-1

Security update for the Linux Kernel

около 6 лет назад
github логотип
GHSA-qgp4-5xqg-pc3p

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-00570

Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1534-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1532-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1527-1

Security update for the Linux Kernel

около 6 лет назад
oracle-oval логотип
ELSA-2019-4531

ELSA-2019-4531: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2019-0512

ELSA-2019-0512: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 6 лет назад
ubuntu логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a...

CVSS3: 5.6
15%
Средний
почти 6 лет назад
redhat логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.9
15%
Средний
почти 6 лет назад
nvd логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a

CVSS3: 5.6
15%
Средний
почти 6 лет назад
msrc логотип
CVE-2019-1125

Windows Kernel Information Disclosure Vulnerability

CVSS3: 5.6
15%
Средний
почти 6 лет назад

Уязвимостей на страницу