Количество 14
Количество 14

CVE-2023-21102
In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

CVE-2023-21102
In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

CVE-2023-21102
In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

CVE-2023-21102
CVE-2023-21102
In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypas ...
GHSA-h5cm-gwjx-3qq9
In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

BDU:2023-02530
Уязвимость функций arch_efi_call_virt_setup() и arch_efi_call_virt_teardown() в модуле arch/arm64/include/asm/efi.h подсистемы Extensible Firmware Interface (EFI) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
ELSA-2023-5069
ELSA-2023-5069: kernel security, bug fix, and enhancement update (IMPORTANT)

SUSE-SU-2023:2831-1
Security update for the Linux Kernel

SUSE-SU-2023:2820-1
Security update for the Linux Kernel

SUSE-SU-2023:2782-1
Security update for the Linux Kernel

SUSE-SU-2023:2646-1
Security update for the Linux Kernel

SUSE-SU-2023:2871-1
Security update for the Linux Kernel

SUSE-SU-2023:2809-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-21102 In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel | CVSS3: 7.8 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-21102 In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-21102 In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel | CVSS3: 7.8 | 0% Низкий | около 2 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-21102 In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypas ... | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
GHSA-h5cm-gwjx-3qq9 In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-02530 Уязвимость функций arch_efi_call_virt_setup() и arch_efi_call_virt_teardown() в модуле arch/arm64/include/asm/efi.h подсистемы Extensible Firmware Interface (EFI) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
ELSA-2023-5069 ELSA-2023-5069: kernel security, bug fix, and enhancement update (IMPORTANT) | почти 2 года назад | |||
![]() | SUSE-SU-2023:2831-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2820-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2782-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2646-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2871-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2809-1 Security update for the Linux Kernel | почти 2 года назад |
Уязвимостей на страницу