Количество 120
Количество 120

BDU:2022-00737
Уязвимость функции cgroup_release_agent_write (kernel/cgroup/cgroup-v1.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии в системе или вызвать отказ в обслуживании
ELSA-2022-9013
ELSA-2022-9013: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9012
ELSA-2022-9012: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-9011
ELSA-2022-9011: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9010
ELSA-2022-9010: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2022:1035-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2)

SUSE-SU-2022:1012-1
Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3)

SUSE-SU-2022:0998-1
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP3)

ROS-20220324-01
Уязвимость cgroup

CVE-2020-0466
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel

CVE-2020-0466
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel

CVE-2020-0466
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel
CVE-2020-0466
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a poss ...
ELSA-2022-9014
ELSA-2022-9014: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2022:0984-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)
ELSA-2022-9667
ELSA-2022-9667: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2022:0978-1
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP3)

RLSA-2022:819
Important: kernel-rt security and bug fix update
ELSA-2022-9151
ELSA-2022-9151: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9150
ELSA-2022-9150: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2022-00737 Уязвимость функции cgroup_release_agent_write (kernel/cgroup/cgroup-v1.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии в системе или вызвать отказ в обслуживании | CVSS3: 7.8 | 6% Низкий | больше 3 лет назад |
ELSA-2022-9013 ELSA-2022-9013: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9012 ELSA-2022-9012: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9011 ELSA-2022-9011: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9010 ELSA-2022-9010: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
![]() | SUSE-SU-2022:1035-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) | около 3 лет назад | ||
![]() | SUSE-SU-2022:1012-1 Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) | около 3 лет назад | ||
![]() | SUSE-SU-2022:0998-1 Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP3) | около 3 лет назад | ||
![]() | ROS-20220324-01 Уязвимость cgroup | 6% Низкий | около 3 лет назад | |
![]() | CVE-2020-0466 In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2020-0466 In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2020-0466 In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад |
CVE-2020-0466 In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a poss ... | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
ELSA-2022-9014 ELSA-2022-9014: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
![]() | SUSE-SU-2022:0984-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3) | около 3 лет назад | ||
ELSA-2022-9667 ELSA-2022-9667: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 3 года назад | |||
![]() | SUSE-SU-2022:0978-1 Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP3) | около 3 лет назад | ||
![]() | RLSA-2022:819 Important: kernel-rt security and bug fix update | больше 3 лет назад | ||
ELSA-2022-9151 ELSA-2022-9151: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9150 ELSA-2022-9150: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад |
Уязвимостей на страницу