Количество 135
Количество 135
RLSA-2023:1566
Important: kernel security, bug fix, and enhancement update
ELSA-2023-1566
ELSA-2023-1566: kernel security, bug fix, and enhancement update (IMPORTANT)
ROS-20230915-10
Множественные уязвимости ядра ОС
CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
CVE-2023-0386
CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the ...
RLSA-2023:1470
Important: kernel security, bug fix, and enhancement update
ELSA-2023-1470
ELSA-2023-1470: kernel security, bug fix, and enhancement update (IMPORTANT)
GHSA-p72q-v88c-rprq
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
ELSA-2023-1703
ELSA-2023-1703: kernel security and bug fix update (IMPORTANT)
BDU:2023-01572
Уязвимость функции stat() подсистемы OverlayFS ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии
SUSE-SU-2023:2428-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP4)
SUSE-SU-2023:2368-1
Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP4)
CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e
CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e
CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e
CVE-2023-0266
Use after free in SNDRV_CTL_IOCTL_ELEM in Linux Kernel
CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the L ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2023:1566 Important: kernel security, bug fix, and enhancement update | больше 2 лет назад | |||
ELSA-2023-1566 ELSA-2023-1566: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 2 лет назад | |||
ROS-20230915-10 Множественные уязвимости ядра ОС | CVSS3: 8.4 | около 2 лет назад | ||
CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. | CVSS3: 7.8 | 59% Средний | больше 2 лет назад | |
CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. | CVSS3: 7 | 59% Средний | почти 3 года назад | |
CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. | CVSS3: 7.8 | 59% Средний | больше 2 лет назад | |
CVSS3: 7.8 | 59% Средний | больше 2 лет назад | ||
CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the ... | CVSS3: 7.8 | 59% Средний | больше 2 лет назад | |
RLSA-2023:1470 Important: kernel security, bug fix, and enhancement update | больше 2 лет назад | |||
ELSA-2023-1470 ELSA-2023-1470: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 2 лет назад | |||
GHSA-p72q-v88c-rprq A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. | CVSS3: 7.8 | 59% Средний | больше 2 лет назад | |
ELSA-2023-1703 ELSA-2023-1703: kernel security and bug fix update (IMPORTANT) | больше 2 лет назад | |||
BDU:2023-01572 Уязвимость функции stat() подсистемы OverlayFS ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 59% Средний | почти 3 года назад | |
SUSE-SU-2023:2428-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP4) | больше 2 лет назад | |||
SUSE-SU-2023:2368-1 Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP4) | больше 2 лет назад | |||
CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e | CVSS3: 7.9 | 0% Низкий | почти 3 года назад | |
CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e | CVSS3: 7.9 | 0% Низкий | почти 3 года назад | |
CVE-2023-0266 Use after free in SNDRV_CTL_IOCTL_ELEM in Linux Kernel | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the L ... | CVSS3: 7.9 | 0% Низкий | почти 3 года назад |
Уязвимостей на страницу