Количество 135
Количество 135
ELSA-2022-10071
ELSA-2022-10071: Unbreakable Enterprise kernel security update (IMPORTANT)
BDU:2022-07336
Уязвимость функции __do_proc_dointvec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
SUSE-SU-2023:2809-1
Security update for the Linux Kernel
CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
CVE-2023-0386
CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the ...
SUSE-SU-2022:4510-1
Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP5)
ELSA-2023-12009
ELSA-2023-12009: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2023-12008
ELSA-2023-12008: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2023-1091
ELSA-2023-1091: kernel security and bug fix update (IMPORTANT)
ELSA-2022-10080
ELSA-2022-10080: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-10078
ELSA-2022-10078: Unbreakable Enterprise kernel security update (IMPORTANT)
CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e
CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e
CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e
CVE-2023-0266
Use after free in SNDRV_CTL_IOCTL_ELEM in Linux Kernel
CVE-2023-0266
A use after free vulnerability exists in the ALSA PCM package in the L ...
SUSE-SU-2023:2651-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2022-10071 ELSA-2022-10071: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 3 года назад | |||
BDU:2022-07336 Уязвимость функции __do_proc_dointvec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии | CVSS3: 8.4 | 0% Низкий | около 3 лет назад | |
SUSE-SU-2023:2809-1 Security update for the Linux Kernel | больше 2 лет назад | |||
CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. | CVSS3: 7.8 | 59% Средний | больше 2 лет назад | |
CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. | CVSS3: 7 | 59% Средний | почти 3 года назад | |
CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. | CVSS3: 7.8 | 59% Средний | больше 2 лет назад | |
CVSS3: 7.8 | 59% Средний | больше 2 лет назад | ||
CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the ... | CVSS3: 7.8 | 59% Средний | больше 2 лет назад | |
SUSE-SU-2022:4510-1 Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP5) | почти 3 года назад | |||
ELSA-2023-12009 ELSA-2023-12009: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2023-12008 ELSA-2023-12008: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2023-1091 ELSA-2023-1091: kernel security and bug fix update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2022-10080 ELSA-2022-10080: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-10078 ELSA-2022-10078: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 3 года назад | |||
CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e | CVSS3: 7.9 | 0% Низкий | почти 3 года назад | |
CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e | CVSS3: 7.9 | 0% Низкий | почти 3 года назад | |
CVE-2023-0266 Use after free in SNDRV_CTL_IOCTL_ELEM in Linux Kernel | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the L ... | CVSS3: 7.9 | 0% Низкий | почти 3 года назад | |
SUSE-SU-2023:2651-1 Security update for the Linux Kernel | больше 2 лет назад |
Уязвимостей на страницу