Количество 23
Количество 23
CVE-2015-8709
kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here.
CVE-2015-8709
kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here.
CVE-2015-8709
kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here.
CVE-2015-8709
kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and g ...
GHSA-fpp6-vh8j-3rgm
** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here."
SUSE-SU-2016:1046-1
Security update for Linux Kernel Live Patch 5
SUSE-SU-2016:1045-1
Security update for Linux Kernel Live Patch 10
SUSE-SU-2016:1041-1
Security update for Linux Kernel Live Patch 8
SUSE-SU-2016:1040-1
Security update for Linux Kernel Live Patch 4
SUSE-SU-2016:1039-1
Security update for Linux Kernel Live Patch 9
SUSE-SU-2016:1038-1
Security update for Linux Kernel Live Patch 6
SUSE-SU-2016:1037-1
Security update for Linux Kernel Live Patch 7
SUSE-SU-2016:1035-1
Security update for Linux Kernel Live Patch 2 for SP 1
SUSE-SU-2016:1034-1
Security update for Linux Kernel Live Patch 11
SUSE-SU-2016:1033-1
Security update for Linux Kernel Live Patch 3 for SP 1
SUSE-SU-2016:1032-1
Security update for Linux Kernel Live Patch 1 for SP 1
SUSE-SU-2016:1031-1
Security update for Linux Kernel Live Patch 0 for SP 1
SUSE-SU-2016:1019-1
Security update for the Linux Kernel
SUSE-SU-2016:0785-1
Security update for the Linux Kernel
openSUSE-SU-2017:0456-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-8709 kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here. | CVSS3: 7 | 0% Низкий | около 10 лет назад | |
CVE-2015-8709 kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here. | CVSS2: 6 | 0% Низкий | около 10 лет назад | |
CVE-2015-8709 kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here. | CVSS3: 7 | 0% Низкий | около 10 лет назад | |
CVE-2015-8709 kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and g ... | CVSS3: 7 | 0% Низкий | около 10 лет назад | |
GHSA-fpp6-vh8j-3rgm ** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here." | CVSS3: 7 | 0% Низкий | больше 3 лет назад | |
SUSE-SU-2016:1046-1 Security update for Linux Kernel Live Patch 5 | почти 10 лет назад | |||
SUSE-SU-2016:1045-1 Security update for Linux Kernel Live Patch 10 | почти 10 лет назад | |||
SUSE-SU-2016:1041-1 Security update for Linux Kernel Live Patch 8 | почти 10 лет назад | |||
SUSE-SU-2016:1040-1 Security update for Linux Kernel Live Patch 4 | почти 10 лет назад | |||
SUSE-SU-2016:1039-1 Security update for Linux Kernel Live Patch 9 | почти 10 лет назад | |||
SUSE-SU-2016:1038-1 Security update for Linux Kernel Live Patch 6 | почти 10 лет назад | |||
SUSE-SU-2016:1037-1 Security update for Linux Kernel Live Patch 7 | почти 10 лет назад | |||
SUSE-SU-2016:1035-1 Security update for Linux Kernel Live Patch 2 for SP 1 | почти 10 лет назад | |||
SUSE-SU-2016:1034-1 Security update for Linux Kernel Live Patch 11 | почти 10 лет назад | |||
SUSE-SU-2016:1033-1 Security update for Linux Kernel Live Patch 3 for SP 1 | почти 10 лет назад | |||
SUSE-SU-2016:1032-1 Security update for Linux Kernel Live Patch 1 for SP 1 | почти 10 лет назад | |||
SUSE-SU-2016:1031-1 Security update for Linux Kernel Live Patch 0 for SP 1 | почти 10 лет назад | |||
SUSE-SU-2016:1019-1 Security update for the Linux Kernel | почти 10 лет назад | |||
SUSE-SU-2016:0785-1 Security update for the Linux Kernel | почти 10 лет назад | |||
openSUSE-SU-2017:0456-1 Security update for the Linux Kernel | почти 9 лет назад |
Уязвимостей на страницу