Количество 84
Количество 84
ELSA-2019-2473
ELSA-2019-2473: kernel security and bug fix update (IMPORTANT)
ELSA-2019-4541
ELSA-2019-4541: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base ...

SUSE-SU-2019:1692-1
Security update for the Linux Kernel

SUSE-SU-2019:1533-1
Security update for the Linux Kernel

SUSE-SU-2019:14089-1
Security update for the Linux Kernel
GHSA-qgp4-5xqg-pc3p
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

BDU:2019-00570
Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

SUSE-SU-2019:1534-1
Security update for the Linux Kernel

SUSE-SU-2019:1532-1
Security update for the Linux Kernel

SUSE-SU-2019:1527-1
Security update for the Linux Kernel
ELSA-2019-4531
ELSA-2019-4531: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-0512
ELSA-2019-0512: kernel security, bug fix, and enhancement update (IMPORTANT)

CVE-2019-1125
An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a...

CVE-2019-1125
An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVE-2019-1125
An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a

CVE-2019-1125
Windows Kernel Information Disclosure Vulnerability
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2019-2473 ELSA-2019-2473: kernel security and bug fix update (IMPORTANT) | почти 6 лет назад | |||
ELSA-2019-4541 ELSA-2019-4541: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 3.3 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base ... | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад | |
![]() | SUSE-SU-2019:1692-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1533-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:14089-1 Security update for the Linux Kernel | около 6 лет назад | ||
GHSA-qgp4-5xqg-pc3p An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2019-00570 Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
![]() | SUSE-SU-2019:1534-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1532-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1527-1 Security update for the Linux Kernel | около 6 лет назад | ||
ELSA-2019-4531 ELSA-2019-4531: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
ELSA-2019-0512 ELSA-2019-0512: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 6 лет назад | |||
![]() | CVE-2019-1125 An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a... | CVSS3: 5.6 | 15% Средний | почти 6 лет назад |
![]() | CVE-2019-1125 An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released... | CVSS3: 5.9 | 15% Средний | почти 6 лет назад |
![]() | CVE-2019-1125 An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a | CVSS3: 5.6 | 15% Средний | почти 6 лет назад |
![]() | CVE-2019-1125 Windows Kernel Information Disclosure Vulnerability | CVSS3: 5.6 | 15% Средний | почти 6 лет назад |
Уязвимостей на страницу