Количество 84
Количество 84
CVE-2019-1125
An information disclosure vulnerability exists when certain central pr ...
ELSA-2019-4577
ELSA-2019-4577: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4532
ELSA-2019-4532: Unbreakable Enterprise kernel security update (IMPORTANT)
GHSA-r79p-pw9q-gxrc
An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.
ELSA-2019-4777
ELSA-2019-4777: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4775
ELSA-2019-4775: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4735
ELSA-2019-4735: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4733
ELSA-2019-4733: Unbreakable Enterprise kernel security update (IMPORTANT)

BDU:2019-04636
Уязвимость операционных систем Windows и Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию
ELSA-2019-2600
ELSA-2019-2600: kernel security and bug fix update (IMPORTANT)
ELSA-2019-2411
ELSA-2019-2411: kernel security update (IMPORTANT)

openSUSE-SU-2019:1407-1
Security update for the Linux Kernel

CVE-2017-17805
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.

CVE-2017-17805
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.

CVE-2017-17805
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
CVE-2017-17805
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 doe ...

CVE-2019-5489
The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.

CVE-2019-5489
The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.

CVE-2019-5489
The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.
CVE-2019-5489
The mincore() implementation in mm/mincore.c in the Linux kernel throu ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
CVE-2019-1125 An information disclosure vulnerability exists when certain central pr ... | CVSS3: 5.6 | 15% Средний | почти 6 лет назад | |
ELSA-2019-4577 ELSA-2019-4577: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
ELSA-2019-4532 ELSA-2019-4532: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
GHSA-r79p-pw9q-gxrc An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073. | CVSS3: 5.5 | 15% Средний | около 3 лет назад | |
ELSA-2019-4777 ELSA-2019-4777: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 6 лет назад | |||
ELSA-2019-4775 ELSA-2019-4775: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 6 лет назад | |||
ELSA-2019-4735 ELSA-2019-4735: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 6 лет назад | |||
ELSA-2019-4733 ELSA-2019-4733: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 6 лет назад | |||
![]() | BDU:2019-04636 Уязвимость операционных систем Windows и Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.5 | 15% Средний | почти 6 лет назад |
ELSA-2019-2600 ELSA-2019-2600: kernel security and bug fix update (IMPORTANT) | почти 6 лет назад | |||
ELSA-2019-2411 ELSA-2019-2411: kernel security update (IMPORTANT) | почти 6 лет назад | |||
![]() | openSUSE-SU-2019:1407-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | CVE-2017-17805 The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable. | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2017-17805 The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable. | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2017-17805 The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable. | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад |
CVE-2017-17805 The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 doe ... | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад | |
![]() | CVE-2019-5489 The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2019-5489 The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. | CVSS3: 7.1 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2019-5489 The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
CVE-2019-5489 The mincore() implementation in mm/mincore.c in the Linux kernel throu ... | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
Уязвимостей на страницу