Количество 100
Количество 100

SUSE-SU-2022:0429-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP3)

BDU:2022-02564
Уязвимость реализации сетевого протокола TIPC операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

SUSE-SU-2022:0761-1
Security update for the Linux Kernel
ELSA-2022-0620
ELSA-2022-0620: kernel security and bug fix update (IMPORTANT)

openSUSE-SU-2022:0768-1
Security update for the Linux Kernel

SUSE-SU-2022:0768-1
Security update for the Linux Kernel

SUSE-SU-2022:0766-1
Security update for the Linux Kernel

SUSE-SU-2022:0757-1
Security update for the Linux Kernel

SUSE-SU-2022:0436-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP3)

SUSE-SU-2022:0767-1
Security update for the Linux Kernel

SUSE-SU-2022:0765-1
Security update for the Linux Kernel

CVE-2022-0847
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

CVE-2022-0847
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

CVE-2022-0847
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

CVE-2022-0847
CVE-2022-0847
A flaw was found in the way the "flags" member of the new pipe buffer ...

SUSE-SU-2022:0759-1
Security update for the Linux Kernel

SUSE-SU-2022:0463-1
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3)

SUSE-SU-2022:0418-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)

CVE-2022-0492
A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2022:0429-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP3) | 57% Средний | больше 3 лет назад | |
![]() | BDU:2022-02564 Уязвимость реализации сетевого протокола TIPC операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии | CVSS3: 8.8 | 57% Средний | больше 3 лет назад |
![]() | SUSE-SU-2022:0761-1 Security update for the Linux Kernel | больше 3 лет назад | ||
ELSA-2022-0620 ELSA-2022-0620: kernel security and bug fix update (IMPORTANT) | больше 3 лет назад | |||
![]() | openSUSE-SU-2022:0768-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0768-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0766-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0757-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0436-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP3) | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0767-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0765-1 Security update for the Linux Kernel | около 3 лет назад | ||
![]() | CVE-2022-0847 A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. | CVSS3: 7.8 | 85% Высокий | больше 3 лет назад |
![]() | CVE-2022-0847 A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. | CVSS3: 7.8 | 85% Высокий | больше 3 лет назад |
![]() | CVE-2022-0847 A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. | CVSS3: 7.8 | 85% Высокий | больше 3 лет назад |
![]() | CVSS3: 7.8 | 85% Высокий | больше 3 лет назад | |
CVE-2022-0847 A flaw was found in the way the "flags" member of the new pipe buffer ... | CVSS3: 7.8 | 85% Высокий | больше 3 лет назад | |
![]() | SUSE-SU-2022:0759-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0463-1 Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3) | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0418-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3) | больше 3 лет назад | ||
![]() | CVE-2022-0492 A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly. | CVSS3: 7.8 | 6% Низкий | больше 3 лет назад |
Уязвимостей на страницу