Количество 145
Количество 145

BDU:2019-00768
Уязвимость процессоров Intel и ARM, связанная с использованием спекулятивного выполнения и чтения из памяти до возврата адресов предыдущих операций записи в память, позволяющая нарушителю раскрыть защищаемую информацию

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base ...

openSUSE-SU-2018:1904-1
Security update for ucode-intel

SUSE-SU-2018:2076-1
Security update for microcode_ctl

SUSE-SU-2018:1935-2
Recommended update for ucode-intel

SUSE-SU-2018:1935-1
Recommended update for ucode-intel

SUSE-SU-2018:1926-1
Security update for ucode-intel

SUSE-SU-2018:1386-1
Security update for qemu

SUSE-SU-2018:1363-1
Security update for qemu
ELSA-2018-4126
ELSA-2018-4126: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2018-1965
ELSA-2018-1965: kernel security and bug fix update (IMPORTANT)

ADV180013
Microsoft Guidance for Rogue System Register Read

ADV180012
Microsoft Guidance for Speculative Store Bypass
GHSA-2wr3-w5rh-2qx4
A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.

openSUSE-SU-2018:3709-1
Security update for qemu

openSUSE-SU-2018:2402-1
Security update for qemu

openSUSE-SU-2018:2399-1
Security update to ucode-intel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2019-00768 Уязвимость процессоров Intel и ARM, связанная с использованием спекулятивного выполнения и чтения из памяти до возврата адресов предыдущих операций записи в память, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.5 | 47% Средний | около 7 лет назад |
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 3.3 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base ... | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад | |
![]() | openSUSE-SU-2018:1904-1 Security update for ucode-intel | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2076-1 Security update for microcode_ctl | почти 7 лет назад | ||
![]() | SUSE-SU-2018:1935-2 Recommended update for ucode-intel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:1935-1 Recommended update for ucode-intel | почти 7 лет назад | ||
![]() | SUSE-SU-2018:1926-1 Security update for ucode-intel | почти 7 лет назад | ||
![]() | SUSE-SU-2018:1386-1 Security update for qemu | около 7 лет назад | ||
![]() | SUSE-SU-2018:1363-1 Security update for qemu | около 7 лет назад | ||
ELSA-2018-4126 ELSA-2018-4126: Unbreakable Enterprise kernel security update (IMPORTANT) | около 7 лет назад | |||
ELSA-2018-1965 ELSA-2018-1965: kernel security and bug fix update (IMPORTANT) | почти 7 лет назад | |||
![]() | ADV180013 Microsoft Guidance for Rogue System Register Read | около 7 лет назад | ||
![]() | ADV180012 Microsoft Guidance for Speculative Store Bypass | CVSS3: 7.1 | около 7 лет назад | |
GHSA-2wr3-w5rh-2qx4 A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash. | CVSS3: 4.4 | 0% Низкий | около 3 лет назад | |
![]() | openSUSE-SU-2018:3709-1 Security update for qemu | больше 6 лет назад | ||
![]() | openSUSE-SU-2018:2402-1 Security update for qemu | почти 7 лет назад | ||
![]() | openSUSE-SU-2018:2399-1 Security update to ucode-intel | почти 7 лет назад |
Уязвимостей на страницу