Количество 61
Количество 61
ELSA-2019-0512
ELSA-2019-0512: kernel security, bug fix, and enhancement update (IMPORTANT)

CVE-2018-18445
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

CVE-2018-18445
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

CVE-2018-18445
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.
CVE-2018-18445
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before ...
ELSA-2019-4577
ELSA-2019-4577: Unbreakable Enterprise kernel security update (IMPORTANT)
GHSA-c3vm-qh5c-27gq
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

BDU:2019-03124
Уязвимость механизма проверки BPF ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base ...

SUSE-SU-2018:3593-1
Security update for the Linux Kernel

SUSE-SU-2018:3589-1
Security update for the Linux Kernel

CVE-2018-9568
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.

CVE-2018-9568
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.

CVE-2018-9568
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
CVE-2018-9568
In sk_clone_lock of sock.c, there is a possible memory corruption due ...

openSUSE-SU-2018:3658-1
Security update for the Linux Kernel

SUSE-SU-2018:3934-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2019-0512 ELSA-2019-0512: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 6 лет назад | |||
![]() | CVE-2018-18445 In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts. | CVSS3: 7.8 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-18445 In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts. | CVSS3: 4.7 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-18445 In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts. | CVSS3: 7.8 | 0% Низкий | больше 6 лет назад |
CVE-2018-18445 In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before ... | CVSS3: 7.8 | 0% Низкий | больше 6 лет назад | |
ELSA-2019-4577 ELSA-2019-4577: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
GHSA-c3vm-qh5c-27gq In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2019-03124 Уязвимость механизма проверки BPF ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 3.3 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base ... | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад | |
![]() | SUSE-SU-2018:3593-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3589-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | CVE-2018-9568 In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel. | CVSS3: 7.8 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-9568 In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel. | CVSS3: 7 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2018-9568 In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel. | CVSS3: 7.8 | 0% Низкий | больше 6 лет назад |
CVE-2018-9568 In sk_clone_lock of sock.c, there is a possible memory corruption due ... | CVSS3: 7.8 | 0% Низкий | больше 6 лет назад | |
![]() | openSUSE-SU-2018:3658-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3934-1 Security update for the Linux Kernel | больше 6 лет назад |
Уязвимостей на страницу