Количество 125
Количество 125

SUSE-SU-2018:0993-1
Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2)

SUSE-SU-2018:0992-1
Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP1)

SUSE-SU-2018:0989-1
Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)

SUSE-SU-2018:0988-1
Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1)
ELSA-2018-4250
ELSA-2018-4250: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2018-4246
ELSA-2018-4246: Unbreakable Enterprise kernel security update (IMPORTANT)
GHSA-j9fr-8f9m-c9qc
The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).

openSUSE-SU-2018:2242-1
Security update for the Linux Kernel

SUSE-SU-2018:2223-1
Security update for the Linux Kernel
ELSA-2018-3083
ELSA-2018-3083: kernel security, bug fix, and enhancement update (IMPORTANT)

CVE-2018-10675
The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.

CVE-2018-10675
The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.

CVE-2018-10675
The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
CVE-2018-10675
The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel be ...
ELSA-2018-4301
ELSA-2018-4301: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2018-2390
ELSA-2018-2390: kernel security and bug fix update (IMPORTANT)

SUSE-SU-2018:2416-1
Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)

SUSE-SU-2018:2391-1
Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)

CVE-2018-13405
The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.

CVE-2018-13405
The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2018:0993-1 Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2) | около 7 лет назад | ||
![]() | SUSE-SU-2018:0992-1 Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP1) | около 7 лет назад | ||
![]() | SUSE-SU-2018:0989-1 Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2) | около 7 лет назад | ||
![]() | SUSE-SU-2018:0988-1 Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1) | около 7 лет назад | ||
ELSA-2018-4250 ELSA-2018-4250: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
ELSA-2018-4246 ELSA-2018-4246: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
GHSA-j9fr-8f9m-c9qc The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE). | CVSS3: 5.5 | 9% Низкий | около 3 лет назад | |
![]() | openSUSE-SU-2018:2242-1 Security update for the Linux Kernel | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2223-1 Security update for the Linux Kernel | почти 7 лет назад | ||
ELSA-2018-3083 ELSA-2018-3083: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 6 лет назад | |||
![]() | CVE-2018-10675 The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls. | CVSS3: 7.8 | 0% Низкий | около 7 лет назад |
![]() | CVE-2018-10675 The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls. | CVSS3: 5.5 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2018-10675 The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls. | CVSS3: 7.8 | 0% Низкий | около 7 лет назад |
CVE-2018-10675 The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel be ... | CVSS3: 7.8 | 0% Низкий | около 7 лет назад | |
ELSA-2018-4301 ELSA-2018-4301: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
ELSA-2018-2390 ELSA-2018-2390: kernel security and bug fix update (IMPORTANT) | почти 7 лет назад | |||
![]() | SUSE-SU-2018:2416-1 Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2391-1 Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) | почти 7 лет назад | ||
![]() | CVE-2018-13405 The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID. | CVSS3: 7.8 | 0% Низкий | почти 7 лет назад |
![]() | CVE-2018-13405 The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID. | CVSS3: 4.4 | 0% Низкий | почти 7 лет назад |
Уязвимостей на страницу