Количество 39
Количество 39

CVE-2021-3640
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.

CVE-2021-3640
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.

CVE-2021-3640
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.

CVE-2021-3640
CVE-2021-3640
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kern ...
GHSA-c8w8-4f3f-5v3j
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.

BDU:2021-03902
Уязвимость функции sco_sock_sendmsg() подсистемы HCI ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение системы или повысить свои привилегии

SUSE-SU-2021:3361-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3)

SUSE-SU-2021:3443-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2)

SUSE-SU-2021:3374-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP3)

SUSE-SU-2021:3459-1
Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3)

SUSE-SU-2021:3440-1
Security update for the Linux Kernel (Live Patch 22 for SLE 15)

SUSE-SU-2021:3401-1
Security update for the Linux Kernel (Live Patch 23 for SLE 15)

SUSE-SU-2021:3371-1
Security update for the Linux Kernel (Live Patch 24 for SLE 15)

SUSE-SU-2021:3360-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)
ELSA-2022-9151
ELSA-2022-9151: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9150
ELSA-2022-9150: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-9148
ELSA-2022-9148: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9147
ELSA-2022-9147: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2021:3192-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-3640 A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system. | CVSS3: 7 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-3640 A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system. | CVSS3: 6.7 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-3640 A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system. | CVSS3: 7 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 7 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3640 A flaw use-after-free in function sco_sock_sendmsg() of the Linux kern ... | CVSS3: 7 | 0% Низкий | больше 3 лет назад | |
GHSA-c8w8-4f3f-5v3j A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system. | CVSS3: 7 | 0% Низкий | больше 3 лет назад | |
![]() | BDU:2021-03902 Уязвимость функции sco_sock_sendmsg() подсистемы HCI ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение системы или повысить свои привилегии | CVSS3: 7 | 0% Низкий | почти 4 года назад |
![]() | SUSE-SU-2021:3361-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3) | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3443-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3374-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP3) | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3459-1 Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3440-1 Security update for the Linux Kernel (Live Patch 22 for SLE 15) | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3401-1 Security update for the Linux Kernel (Live Patch 23 for SLE 15) | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3371-1 Security update for the Linux Kernel (Live Patch 24 for SLE 15) | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3360-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3) | больше 3 лет назад | ||
ELSA-2022-9151 ELSA-2022-9151: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9150 ELSA-2022-9150: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9148 ELSA-2022-9148: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9147 ELSA-2022-9147: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
![]() | SUSE-SU-2021:3192-1 Security update for the Linux Kernel | больше 3 лет назад |
Уязвимостей на страницу