Количество 93
Количество 93

SUSE-SU-2022:4615-1
Security update for the Linux Kernel

SUSE-SU-2022:4573-1
Security update for the Linux Kernel

SUSE-SU-2022:4614-1
Security update for the Linux Kernel

SUSE-SU-2022:4589-1
Security update for the Linux Kernel
GHSA-pvw8-76h2-7q32
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url

BDU:2022-07074
Уязвимость функций l2cap_connect и l2cap_le_connect_req (net/bluetooth/l2cap_core.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2022:4617-1
Security update for the Linux Kernel
ELSA-2023-12121
ELSA-2023-12121: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2023-12119
ELSA-2023-12119: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2022-42895
There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url

CVE-2022-42895
There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url

CVE-2022-42895
There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url
CVE-2022-42895
There is an infoleak vulnerability in the Linux kernel's net/bluetooth ...

CVE-2022-4378
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVE-2022-4378
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVE-2022-4378
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVE-2022-4378
CVE-2022-4378
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem ...

RLSA-2023:4517
Important: kernel security and bug fix update
ELSA-2024-1249
ELSA-2024-1249: kernel security and bug fix update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2022:4615-1 Security update for the Linux Kernel | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4573-1 Security update for the Linux Kernel | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4614-1 Security update for the Linux Kernel | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4589-1 Security update for the Linux Kernel | больше 2 лет назад | ||
GHSA-pvw8-76h2-7q32 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад | |
![]() | BDU:2022-07074 Уязвимость функций l2cap_connect и l2cap_le_connect_req (net/bluetooth/l2cap_core.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2022:4617-1 Security update for the Linux Kernel | больше 2 лет назад | ||
ELSA-2023-12121 ELSA-2023-12121: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2023-12119 ELSA-2023-12119: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 2 лет назад | |||
![]() | CVE-2022-42895 There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url | CVSS3: 5.1 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-42895 There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url | CVSS3: 6.5 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-42895 There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url | CVSS3: 5.1 | 0% Низкий | больше 2 лет назад |
CVE-2022-42895 There is an infoleak vulnerability in the Linux kernel's net/bluetooth ... | CVSS3: 5.1 | 0% Низкий | больше 2 лет назад | |
![]() | CVE-2022-4378 A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-4378 A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-4378 A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
CVE-2022-4378 A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem ... | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
![]() | RLSA-2023:4517 Important: kernel security and bug fix update | больше 1 года назад | ||
ELSA-2024-1249 ELSA-2024-1249: kernel security and bug fix update (IMPORTANT) | больше 1 года назад |
Уязвимостей на страницу