Количество 135
Количество 135

SUSE-SU-2023:2459-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP4)

SUSE-SU-2023:2369-1
Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP4)

SUSE-SU-2023:2468-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)

SUSE-SU-2023:2455-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP4)

SUSE-SU-2023:2443-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP4)

SUSE-SU-2023:2431-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4)

SUSE-SU-2023:2425-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP4)

SUSE-SU-2023:2384-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP4)

SUSE-SU-2023:2371-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP4)
GHSA-h8jm-3c82-6vvq
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

BDU:2023-00382
Уязвимость компонента ALSA:pcm (звуковой подсистемы) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании и получить несанкционированный доступ к защищаемой информации

SUSE-SU-2023:1653-1
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP5)

SUSE-SU-2023:1640-1
Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5)

SUSE-SU-2023:1619-1
Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP5)

SUSE-SU-2023:1602-1
Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP5)

SUSE-SU-2023:2809-1
Security update for the Linux Kernel

SUSE-SU-2023:2231-1
Security update for the Linux Kernel

SUSE-SU-2023:2141-1
Security update for the Linux Kernel

SUSE-SU-2023:2140-1
Security update for the Linux Kernel

CVE-2022-4269
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2023:2459-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2369-1 Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2468-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2455-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2443-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2431-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2425-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2384-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2371-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP4) | около 2 лет назад | ||
GHSA-h8jm-3c82-6vvq A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
![]() | BDU:2023-00382 Уязвимость компонента ALSA:pcm (звуковой подсистемы) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании и получить несанкционированный доступ к защищаемой информации | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2023:1653-1 Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP5) | около 2 лет назад | ||
![]() | SUSE-SU-2023:1640-1 Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5) | около 2 лет назад | ||
![]() | SUSE-SU-2023:1619-1 Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP5) | около 2 лет назад | ||
![]() | SUSE-SU-2023:1602-1 Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP5) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2809-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2231-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | SUSE-SU-2023:2141-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | SUSE-SU-2023:2140-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | CVE-2022-4269 A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition. | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад |
Уязвимостей на страницу