Количество 21
Количество 21
CVE-2023-0459
Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
CVE-2023-0459
Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
CVE-2023-0459
Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
CVE-2023-0459
Copy_from_user Spectre-V1 Gadget in Linux Kernel
CVE-2023-0459
Copy_from_user on 64-bit versions of the Linux kernel does not impleme ...
GHSA-82f5-ghc6-rj5c
Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
BDU:2023-02532
Уязвимость функции _copy_from_user() в модуле lib/usercopy.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
SUSE-SU-2023:3329-1
Security update for the Linux Kernel
SUSE-SU-2023:3309-1
Security update for the Linux Kernel
SUSE-SU-2023:3377-1
Security update for the Linux Kernel
SUSE-SU-2023:3349-1
Security update for the Linux Kernel
SUSE-SU-2023:3392-1
Security update for the Linux Kernel
SUSE-SU-2023:3333-1
Security update for the Linux Kernel
SUSE-SU-2023:3313-1
Security update for the Linux Kernel
SUSE-SU-2023:3324-1
Security update for the Linux Kernel
SUSE-SU-2023:3391-1
Security update for the Linux Kernel
SUSE-SU-2023:3376-1
Security update for the Linux Kernel
SUSE-SU-2023:3311-1
Security update for the Linux Kernel
SUSE-SU-2023:3390-1
Security update for the Linux Kernel
SUSE-SU-2023:3318-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-0459 Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47 | CVSS3: 6.5 | 0% Низкий | больше 2 лет назад | |
CVE-2023-0459 Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47 | CVSS3: 6.7 | 0% Низкий | почти 6 лет назад | |
CVE-2023-0459 Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47 | CVSS3: 6.5 | 0% Низкий | больше 2 лет назад | |
CVE-2023-0459 Copy_from_user Spectre-V1 Gadget in Linux Kernel | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад | |
CVE-2023-0459 Copy_from_user on 64-bit versions of the Linux kernel does not impleme ... | CVSS3: 6.5 | 0% Низкий | больше 2 лет назад | |
GHSA-82f5-ghc6-rj5c Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47 | CVSS3: 6.5 | 0% Низкий | больше 2 лет назад | |
BDU:2023-02532 Уязвимость функции _copy_from_user() в модуле lib/usercopy.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.5 | 0% Низкий | почти 3 года назад | |
SUSE-SU-2023:3329-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3309-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3377-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3349-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3392-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3333-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3313-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3324-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3391-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3376-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3311-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3390-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:3318-1 Security update for the Linux Kernel | больше 2 лет назад |
Уязвимостей на страницу