Количество 145
Количество 145
BDU:2019-00768
Уязвимость процессоров Intel и ARM, связанная с использованием спекулятивного выполнения и чтения из памяти до возврата адресов предыдущих операций записи в память, позволяющая нарушителю раскрыть защищаемую информацию
CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base ...
openSUSE-SU-2018:1904-1
Security update for ucode-intel
SUSE-SU-2018:2076-1
Security update for microcode_ctl
SUSE-SU-2018:1935-2
Recommended update for ucode-intel
SUSE-SU-2018:1935-1
Recommended update for ucode-intel
SUSE-SU-2018:1926-1
Security update for ucode-intel
SUSE-SU-2018:1386-1
Security update for qemu
SUSE-SU-2018:1363-1
Security update for qemu
ELSA-2018-4126
ELSA-2018-4126: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2018-1965
ELSA-2018-1965: kernel security and bug fix update (IMPORTANT)
ADV180013
Microsoft Guidance for Rogue System Register Read
ADV180012
Microsoft Guidance for Speculative Store Bypass
GHSA-2wr3-w5rh-2qx4
A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.
openSUSE-SU-2018:3709-1
Security update for qemu
openSUSE-SU-2018:2402-1
Security update for qemu
openSUSE-SU-2018:2399-1
Security update to ucode-intel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2019-00768 Уязвимость процессоров Intel и ARM, связанная с использованием спекулятивного выполнения и чтения из памяти до возврата адресов предыдущих операций записи в память, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.5 | 39% Средний | больше 7 лет назад | |
CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | около 7 лет назад | |
CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 3.3 | 0% Низкий | около 7 лет назад | |
CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | около 7 лет назад | |
CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base ... | CVSS3: 5.5 | 0% Низкий | около 7 лет назад | |
openSUSE-SU-2018:1904-1 Security update for ucode-intel | больше 7 лет назад | |||
SUSE-SU-2018:2076-1 Security update for microcode_ctl | больше 7 лет назад | |||
SUSE-SU-2018:1935-2 Recommended update for ucode-intel | около 7 лет назад | |||
SUSE-SU-2018:1935-1 Recommended update for ucode-intel | больше 7 лет назад | |||
SUSE-SU-2018:1926-1 Security update for ucode-intel | больше 7 лет назад | |||
SUSE-SU-2018:1386-1 Security update for qemu | больше 7 лет назад | |||
SUSE-SU-2018:1363-1 Security update for qemu | больше 7 лет назад | |||
ELSA-2018-4126 ELSA-2018-4126: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад | |||
ELSA-2018-1965 ELSA-2018-1965: kernel security and bug fix update (IMPORTANT) | больше 7 лет назад | |||
ADV180013 Microsoft Guidance for Rogue System Register Read | больше 7 лет назад | |||
ADV180012 Microsoft Guidance for Speculative Store Bypass | CVSS3: 7.1 | больше 7 лет назад | ||
GHSA-2wr3-w5rh-2qx4 A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash. | CVSS3: 4.4 | 0% Низкий | больше 3 лет назад | |
openSUSE-SU-2018:3709-1 Security update for qemu | около 7 лет назад | |||
openSUSE-SU-2018:2402-1 Security update for qemu | около 7 лет назад | |||
openSUSE-SU-2018:2399-1 Security update to ucode-intel | около 7 лет назад |
Уязвимостей на страницу