Количество 135
Количество 135
ELSA-2022-10071
ELSA-2022-10071: Unbreakable Enterprise kernel security update (IMPORTANT)

BDU:2022-07336
Уязвимость функции __do_proc_dointvec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

SUSE-SU-2023:2809-1
Security update for the Linux Kernel

CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.

CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.

CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.

CVE-2023-0386
CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the ...

SUSE-SU-2022:4510-1
Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP5)
ELSA-2023-12009
ELSA-2023-12009: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2023-12008
ELSA-2023-12008: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2023-1091
ELSA-2023-1091: kernel security and bug fix update (IMPORTANT)
ELSA-2022-10080
ELSA-2022-10080: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-10078
ELSA-2022-10078: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

CVE-2023-0266
CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the L ...

SUSE-SU-2023:2651-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2022-10071 ELSA-2022-10071: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 2 лет назад | |||
![]() | BDU:2022-07336 Уязвимость функции __do_proc_dointvec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии | CVSS3: 8.4 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2023:2809-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. | CVSS3: 7.8 | 54% Средний | около 2 лет назад |
![]() | CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. | CVSS3: 7 | 54% Средний | больше 2 лет назад |
![]() | CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. | CVSS3: 7.8 | 54% Средний | около 2 лет назад |
![]() | CVSS3: 7.8 | 54% Средний | около 2 лет назад | |
CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the ... | CVSS3: 7.8 | 54% Средний | около 2 лет назад | |
![]() | SUSE-SU-2022:4510-1 Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP5) | больше 2 лет назад | ||
ELSA-2023-12009 ELSA-2023-12009: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2023-12008 ELSA-2023-12008: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2023-1091 ELSA-2023-1091: kernel security and bug fix update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2022-10080 ELSA-2022-10080: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2022-10078 ELSA-2022-10078: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 2 лет назад | |||
![]() | CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e | CVSS3: 7.9 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e | CVSS3: 7.9 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the L ... | CVSS3: 7.9 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:2651-1 Security update for the Linux Kernel | почти 2 года назад |
Уязвимостей на страницу