Количество 67
Количество 67
ELSA-2022-9423
ELSA-2022-9423: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-9422
ELSA-2022-9422: Unbreakable Enterprise kernel security update (IMPORTANT)

BDU:2022-04974
Уязвимость реализации режима блокировки Lockdown Mode ядра операционных систем Linux, позволяющая нарушителю обойти ограничения безопасности

SUSE-SU-2022:2393-1
Security update for the Linux Kernel

SUSE-SU-2022:2103-1
Security update for the Linux Kernel
ELSA-2022-9927
ELSA-2022-9927: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9926
ELSA-2022-9926: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-9871
ELSA-2022-9871: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9870
ELSA-2022-9870: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-9426
ELSA-2022-9426: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9425
ELSA-2022-9425: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2022-1966
[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel's netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.

CVE-2022-1966
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

SUSE-SU-2022:2082-1
Security update for the Linux Kernel

SUSE-SU-2022:2077-1
Security update for the Linux Kernel

SUSE-SU-2022:2111-1
Security update for the Linux Kernel

CVE-2022-1729
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

CVE-2022-1729
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

CVE-2022-1729
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
CVE-2022-1729
A race condition was found the Linux kernel in perf_event_open() which ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2022-9423 ELSA-2022-9423: Unbreakable Enterprise kernel security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-9422 ELSA-2022-9422: Unbreakable Enterprise kernel security update (IMPORTANT) | около 3 лет назад | |||
![]() | BDU:2022-04974 Уязвимость реализации режима блокировки Lockdown Mode ядра операционных систем Linux, позволяющая нарушителю обойти ограничения безопасности | CVSS3: 6.7 | 0% Низкий | около 3 лет назад |
![]() | SUSE-SU-2022:2393-1 Security update for the Linux Kernel | около 3 лет назад | ||
![]() | SUSE-SU-2022:2103-1 Security update for the Linux Kernel | около 3 лет назад | ||
ELSA-2022-9927 ELSA-2022-9927: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-9926 ELSA-2022-9926: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-9871 ELSA-2022-9871: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-9870 ELSA-2022-9870: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-9426 ELSA-2022-9426: Unbreakable Enterprise kernel-container security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-9425 ELSA-2022-9425: Unbreakable Enterprise kernel security update (IMPORTANT) | около 3 лет назад | |||
![]() | CVE-2022-1966 [REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel's netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. | около 3 лет назад | ||
![]() | CVE-2022-1966 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. | около 3 лет назад | ||
![]() | SUSE-SU-2022:2082-1 Security update for the Linux Kernel | около 3 лет назад | ||
![]() | SUSE-SU-2022:2077-1 Security update for the Linux Kernel | около 3 лет назад | ||
![]() | SUSE-SU-2022:2111-1 Security update for the Linux Kernel | около 3 лет назад | ||
![]() | CVE-2022-1729 A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc. | CVSS3: 7 | 0% Низкий | почти 3 года назад |
![]() | CVE-2022-1729 A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc. | CVSS3: 7.4 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-1729 A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc. | CVSS3: 7 | 0% Низкий | почти 3 года назад |
CVE-2022-1729 A race condition was found the Linux kernel in perf_event_open() which ... | CVSS3: 7 | 0% Низкий | почти 3 года назад |
Уязвимостей на страницу