Количество 9
Количество 9

CVE-2023-0458
A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11

CVE-2023-0458
A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11

CVE-2023-0458
A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11

CVE-2023-0458
CVE-2023-0458
A speculative pointer dereference problem exists in the Linux Kernel o ...

BDU:2023-02515
Уязвимость функции do_prlimit() ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
ELSA-2023-4377
ELSA-2023-4377: kernel security, bug fix, and enhancement update (IMPORTANT)
ELSA-2023-12375
ELSA-2023-12375: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2023-7077
ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-0458 A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11 | CVSS3: 5.3 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-0458 A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11 | CVSS3: 4.7 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-0458 A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11 | CVSS3: 5.3 | 0% Низкий | около 2 лет назад |
![]() | CVSS3: 4.7 | 0% Низкий | около 2 лет назад | |
CVE-2023-0458 A speculative pointer dereference problem exists in the Linux Kernel o ... | CVSS3: 5.3 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-02515 Уязвимость функции do_prlimit() ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 4.7 | 0% Низкий | больше 2 лет назад |
ELSA-2023-4377 ELSA-2023-4377: kernel security, bug fix, and enhancement update (IMPORTANT) | почти 2 года назад | |||
ELSA-2023-12375 ELSA-2023-12375: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-7077 ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 1 года назад |
Уязвимостей на страницу