Количество 169
Количество 169
ELSA-2018-1633
ELSA-2018-1633: qemu-kvm security update (IMPORTANT)
ELSA-2018-1632
ELSA-2018-1632: libvirt security update (IMPORTANT)
ELSA-2018-1629
ELSA-2018-1629: kernel security update (IMPORTANT)
BDU:2019-00768
Уязвимость процессоров Intel и ARM, связанная с использованием спекулятивного выполнения и чтения из памяти до возврата адресов предыдущих операций записи в память, позволяющая нарушителю раскрыть защищаемую информацию
CVE-2017-14106
The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.
CVE-2017-14106
The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.
CVE-2017-14106
The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.
CVE-2017-14106
The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel befo ...
CVE-2018-3620
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
CVE-2018-3620
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
CVE-2018-3620
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
CVE-2018-3620
Systems with microprocessors utilizing speculative execution and addre ...
openSUSE-SU-2018:1904-1
Security update for ucode-intel
SUSE-SU-2018:2076-1
Security update for microcode_ctl
SUSE-SU-2018:1935-2
Recommended update for ucode-intel
SUSE-SU-2018:1935-1
Recommended update for ucode-intel
SUSE-SU-2018:1926-1
Security update for ucode-intel
SUSE-SU-2018:1386-1
Security update for qemu
SUSE-SU-2018:1363-1
Security update for qemu
ELSA-2018-4126
ELSA-2018-4126: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2018-1633 ELSA-2018-1633: qemu-kvm security update (IMPORTANT) | больше 7 лет назад | |||
ELSA-2018-1632 ELSA-2018-1632: libvirt security update (IMPORTANT) | больше 7 лет назад | |||
ELSA-2018-1629 ELSA-2018-1629: kernel security update (IMPORTANT) | больше 7 лет назад | |||
BDU:2019-00768 Уязвимость процессоров Intel и ARM, связанная с использованием спекулятивного выполнения и чтения из памяти до возврата адресов предыдущих операций записи в память, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.5 | 39% Средний | больше 7 лет назад | |
CVE-2017-14106 The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. | CVSS3: 5.5 | 0% Низкий | около 8 лет назад | |
CVE-2017-14106 The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. | CVSS3: 5.5 | 0% Низкий | около 8 лет назад | |
CVE-2017-14106 The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. | CVSS3: 5.5 | 0% Низкий | около 8 лет назад | |
CVE-2017-14106 The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel befo ... | CVSS3: 5.5 | 0% Низкий | около 8 лет назад | |
CVE-2018-3620 Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis. | CVSS3: 5.6 | 3% Низкий | больше 7 лет назад | |
CVE-2018-3620 Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis. | CVSS3: 5.6 | 3% Низкий | больше 7 лет назад | |
CVE-2018-3620 Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis. | CVSS3: 5.6 | 3% Низкий | больше 7 лет назад | |
CVE-2018-3620 Systems with microprocessors utilizing speculative execution and addre ... | CVSS3: 5.6 | 3% Низкий | больше 7 лет назад | |
openSUSE-SU-2018:1904-1 Security update for ucode-intel | больше 7 лет назад | |||
SUSE-SU-2018:2076-1 Security update for microcode_ctl | больше 7 лет назад | |||
SUSE-SU-2018:1935-2 Recommended update for ucode-intel | около 7 лет назад | |||
SUSE-SU-2018:1935-1 Recommended update for ucode-intel | больше 7 лет назад | |||
SUSE-SU-2018:1926-1 Security update for ucode-intel | больше 7 лет назад | |||
SUSE-SU-2018:1386-1 Security update for qemu | больше 7 лет назад | |||
SUSE-SU-2018:1363-1 Security update for qemu | больше 7 лет назад | |||
ELSA-2018-4126 ELSA-2018-4126: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад |
Уязвимостей на страницу