Количество 63
Количество 63

ROS-20220125-19
Уязвимость файловой системы XFS

RLSA-2022:176
Important: kernel-rt security and bug fix update
ELSA-2022-0188
ELSA-2022-0188: kernel security and bug fix update (IMPORTANT)

CVE-2021-0920
In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel

CVE-2021-0920
In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel

CVE-2021-0920
In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel
CVE-2021-0920
In unix_scm_to_skb of af_unix.c, there is a possible use after free bu ...
GHSA-r535-rfwp-fm57
In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel

BDU:2021-05539
Уязвимость реализации функции epoll_loop_check_proc() ядра операционных систем Android, позволяющая нарушителю повысить свои привилегии
ELSA-2022-9148
ELSA-2022-9148: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9147
ELSA-2022-9147: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2022:0996-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP2)

SUSE-SU-2022:0667-1
Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3)

SUSE-SU-2022:0647-1
Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP1)
GHSA-r93f-j2vf-vmc4
In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel

BDU:2022-00836
Уязвимость функции unix_scm_to_skb (af_unix.c) ядра операционной системы Android, позволяющая нарушителю повысить свои привилегии

SUSE-SU-2022:14905-1
Security update for the Linux Kernel

SUSE-SU-2022:1034-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP3)

SUSE-SU-2022:0668-1
Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3)

SUSE-SU-2022:0615-1
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP3)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | ROS-20220125-19 Уязвимость файловой системы XFS | 0% Низкий | больше 3 лет назад | |
![]() | RLSA-2022:176 Important: kernel-rt security and bug fix update | больше 3 лет назад | ||
ELSA-2022-0188 ELSA-2022-0188: kernel security and bug fix update (IMPORTANT) | больше 3 лет назад | |||
![]() | CVE-2021-0920 In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel | CVSS3: 6.4 | 1% Низкий | больше 3 лет назад |
![]() | CVE-2021-0920 In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel | CVSS3: 7.4 | 1% Низкий | около 4 лет назад |
![]() | CVE-2021-0920 In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel | CVSS3: 6.4 | 1% Низкий | больше 3 лет назад |
CVE-2021-0920 In unix_scm_to_skb of af_unix.c, there is a possible use after free bu ... | CVSS3: 6.4 | 1% Низкий | больше 3 лет назад | |
GHSA-r535-rfwp-fm57 In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel | CVSS3: 7.8 | 1% Низкий | больше 3 лет назад | |
![]() | BDU:2021-05539 Уязвимость реализации функции epoll_loop_check_proc() ядра операционных систем Android, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 1% Низкий | почти 5 лет назад |
ELSA-2022-9148 ELSA-2022-9148: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9147 ELSA-2022-9147: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
![]() | SUSE-SU-2022:0996-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP2) | 1% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:0667-1 Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) | 1% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:0647-1 Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP1) | 1% Низкий | больше 3 лет назад | |
GHSA-r93f-j2vf-vmc4 In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel | CVSS3: 6.4 | 1% Низкий | больше 3 лет назад | |
![]() | BDU:2022-00836 Уязвимость функции unix_scm_to_skb (af_unix.c) ядра операционной системы Android, позволяющая нарушителю повысить свои привилегии | CVSS3: 6.4 | 1% Низкий | больше 3 лет назад |
![]() | SUSE-SU-2022:14905-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2022:1034-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP3) | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0668-1 Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0615-1 Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP3) | больше 3 лет назад |
Уязвимостей на страницу