Количество 68
Количество 68
ELSA-2022-9423
ELSA-2022-9423: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-9422
ELSA-2022-9422: Unbreakable Enterprise kernel security update (IMPORTANT)

BDU:2022-04974
Уязвимость реализации режима блокировки Lockdown Mode ядра операционных систем Linux, позволяющая нарушителю обойти ограничения безопасности

SUSE-SU-2022:2393-1
Security update for the Linux Kernel

SUSE-SU-2022:2103-1
Security update for the Linux Kernel
ELSA-2022-9927
ELSA-2022-9927: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9926
ELSA-2022-9926: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-9871
ELSA-2022-9871: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9870
ELSA-2022-9870: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-9426
ELSA-2022-9426: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9425
ELSA-2022-9425: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2022:2082-1
Security update for the Linux Kernel

SUSE-SU-2022:2077-1
Security update for the Linux Kernel

CVE-2022-1966
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

CVE-2022-1966
[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel's netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.

CVE-2022-1966
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

SUSE-SU-2022:2111-1
Security update for the Linux Kernel

CVE-2022-1729
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

CVE-2022-1729
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

CVE-2022-1729
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2022-9423 ELSA-2022-9423: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9422 ELSA-2022-9422: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
![]() | BDU:2022-04974 Уязвимость реализации режима блокировки Lockdown Mode ядра операционных систем Linux, позволяющая нарушителю обойти ограничения безопасности | CVSS3: 6.7 | 0% Низкий | больше 3 лет назад |
![]() | SUSE-SU-2022:2393-1 Security update for the Linux Kernel | около 3 лет назад | ||
![]() | SUSE-SU-2022:2103-1 Security update for the Linux Kernel | больше 3 лет назад | ||
ELSA-2022-9927 ELSA-2022-9927: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-9926 ELSA-2022-9926: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-9871 ELSA-2022-9871: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-9870 ELSA-2022-9870: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-9426 ELSA-2022-9426: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9425 ELSA-2022-9425: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
![]() | SUSE-SU-2022:2082-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2022:2077-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | CVE-2022-1966 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. | больше 3 лет назад | ||
![]() | CVE-2022-1966 [REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel's netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. | больше 3 лет назад | ||
![]() | CVE-2022-1966 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. | больше 3 лет назад | ||
![]() | SUSE-SU-2022:2111-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | CVE-2022-1729 A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc. | CVSS3: 7 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-1729 A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc. | CVSS3: 7.4 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2022-1729 A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc. | CVSS3: 7 | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу