Количество 18
Количество 18
CVE-2022-2991
A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.
CVE-2022-2991
A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.
CVE-2022-2991
A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.
CVE-2022-2991
A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.
CVE-2022-2991
A heap-based buffer overflow was found in the Linux kernel's LightNVM ...
GHSA-9fpj-jhm5-p6h9
A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.
BDU:2023-02304
Уязвимость подсистемы LightNVM ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
SUSE-SU-2023:2023-1
Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP1)
SUSE-SU-2023:2007-1
Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP2)
SUSE-SU-2023:1983-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP2)
SUSE-SU-2023:1973-1
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP5)
SUSE-SU-2023:1971-1
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP4)
SUSE-SU-2023:0852-1
Security update for the Linux Kernel
SUSE-SU-2023:0634-1
Security update for the Linux Kernel
SUSE-SU-2023:0768-1
Security update for the Linux Kernel
SUSE-SU-2022:3294-1
Security update for the Linux Kernel
SUSE-SU-2022:3263-1
Security update for the Linux Kernel
SUSE-SU-2025:0834-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-2991 A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability. | CVSS3: 6.7 | 0% Низкий | больше 3 лет назад | |
CVE-2022-2991 A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability. | CVSS3: 8.2 | 0% Низкий | больше 3 лет назад | |
CVE-2022-2991 A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability. | CVSS3: 6.7 | 0% Низкий | больше 3 лет назад | |
CVE-2022-2991 A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability. | CVSS3: 6.7 | 0% Низкий | больше 3 лет назад | |
CVE-2022-2991 A heap-based buffer overflow was found in the Linux kernel's LightNVM ... | CVSS3: 6.7 | 0% Низкий | больше 3 лет назад | |
GHSA-9fpj-jhm5-p6h9 A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability. | CVSS3: 6.7 | 0% Низкий | больше 3 лет назад | |
BDU:2023-02304 Уязвимость подсистемы LightNVM ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код | CVSS3: 6.7 | 0% Низкий | больше 4 лет назад | |
SUSE-SU-2023:2023-1 Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP1) | почти 3 года назад | |||
SUSE-SU-2023:2007-1 Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP2) | почти 3 года назад | |||
SUSE-SU-2023:1983-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP2) | почти 3 года назад | |||
SUSE-SU-2023:1973-1 Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP5) | почти 3 года назад | |||
SUSE-SU-2023:1971-1 Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP4) | почти 3 года назад | |||
SUSE-SU-2023:0852-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:0634-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:0768-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2022:3294-1 Security update for the Linux Kernel | больше 3 лет назад | |||
SUSE-SU-2022:3263-1 Security update for the Linux Kernel | больше 3 лет назад | |||
SUSE-SU-2025:0834-1 Security update for the Linux Kernel | 11 месяцев назад |
Уязвимостей на страницу