Количество 106
Количество 106
ELSA-2018-2390
ELSA-2018-2390: kernel security and bug fix update (IMPORTANT)

SUSE-SU-2018:2637-1
Security update for the Linux Kernel

SUSE-SU-2018:2366-1
Security update for the Linux Kernel

SUSE-SU-2018:2332-1
Security update for the Linux Kernel
GHSA-h9mf-j5vf-pc99
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
ELSA-2018-4215
ELSA-2018-4215: Unbreakable Enterprise kernel security update (IMPORTANT)

BDU:2018-00995
Уязвимость процессоров Intel, связанная с возможностью спекулятивного выполнения команд и позволяющая нарушителю получить несанкционированный доступ к памяти ядра операционной системы или SMM-памяти
ELSA-2018-4214
ELSA-2018-4214: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2018-5391
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

CVE-2018-5391
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

CVE-2018-5391
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
CVE-2018-5391
The Linux kernel, versions 3.9+, is vulnerable to a denial of service ...
ELSA-2018-4235
ELSA-2018-4235: kernel security update (IMPORTANT)

CVE-2018-3646
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

CVE-2018-3646
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

CVE-2018-3646
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
CVE-2018-3646
Systems with microprocessors utilizing speculative execution and addre ...

SUSE-SU-2018:3881-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15)

SUSE-SU-2018:3860-1
Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)

SUSE-SU-2018:3792-1
Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2018-2390 ELSA-2018-2390: kernel security and bug fix update (IMPORTANT) | почти 7 лет назад | |||
![]() | SUSE-SU-2018:2637-1 Security update for the Linux Kernel | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2366-1 Security update for the Linux Kernel | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2332-1 Security update for the Linux Kernel | почти 7 лет назад | ||
GHSA-h9mf-j5vf-pc99 Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis. | CVSS3: 5.6 | 3% Низкий | около 3 лет назад | |
ELSA-2018-4215 ELSA-2018-4215: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 7 лет назад | |||
![]() | BDU:2018-00995 Уязвимость процессоров Intel, связанная с возможностью спекулятивного выполнения команд и позволяющая нарушителю получить несанкционированный доступ к памяти ядра операционной системы или SMM-памяти | CVSS3: 7.1 | 3% Низкий | больше 7 лет назад |
ELSA-2018-4214 ELSA-2018-4214: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 7 лет назад | |||
![]() | CVE-2018-5391 The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size. | CVSS3: 7.5 | 2% Низкий | почти 7 лет назад |
![]() | CVE-2018-5391 The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size. | CVSS3: 7.5 | 2% Низкий | почти 7 лет назад |
![]() | CVE-2018-5391 The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size. | CVSS3: 7.5 | 2% Низкий | почти 7 лет назад |
CVE-2018-5391 The Linux kernel, versions 3.9+, is vulnerable to a denial of service ... | CVSS3: 7.5 | 2% Низкий | почти 7 лет назад | |
ELSA-2018-4235 ELSA-2018-4235: kernel security update (IMPORTANT) | больше 6 лет назад | |||
![]() | CVE-2018-3646 Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. | CVSS3: 5.6 | 6% Низкий | почти 7 лет назад |
![]() | CVE-2018-3646 Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. | CVSS3: 5.6 | 6% Низкий | почти 7 лет назад |
![]() | CVE-2018-3646 Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. | CVSS3: 5.6 | 6% Низкий | почти 7 лет назад |
CVE-2018-3646 Systems with microprocessors utilizing speculative execution and addre ... | CVSS3: 5.6 | 6% Низкий | почти 7 лет назад | |
![]() | SUSE-SU-2018:3881-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15) | 2% Низкий | больше 6 лет назад | |
![]() | SUSE-SU-2018:3860-1 Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3) | 2% Низкий | больше 6 лет назад | |
![]() | SUSE-SU-2018:3792-1 Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) | 2% Низкий | больше 6 лет назад |
Уязвимостей на страницу