Количество 187
Количество 187
ELSA-2014-3073
ELSA-2014-3073: unbreakable enterprise kernel security update (IMPORTANT)
ELSA-2014-1167
ELSA-2014-1167: kernel security and bug fix update (IMPORTANT)

CVE-2014-0205
The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.

CVE-2014-0205
The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.

CVE-2014-0205
The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.
CVE-2014-0205
The futex_wait function in kernel/futex.c in the Linux kernel before 2 ...
GHSA-cwrh-45v3-q8mf
The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.

CVE-2014-3917
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

CVE-2014-3917
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

CVE-2014-3917
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
CVE-2014-3917
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDIT ...
GHSA-qjxx-j28r-gvj2
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
ELSA-2014-3074
ELSA-2014-3074: unbreakable enterprise kernel security bug fix update (IMPORTANT)
ELSA-2014-3072
ELSA-2014-3072: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2014-1281
ELSA-2014-1281: kernel security and bug fix update (MODERATE)
ELSA-2014-1143
ELSA-2014-1143: kernel security and bug fix update (MODERATE)
ELSA-2014-1143-1
ELSA-2014-1143-1: kernel security and bug fix update (MODERATE)

BDU:2015-05843
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

BDU:2015-05842
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

BDU:2015-05841
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2014-3073 ELSA-2014-3073: unbreakable enterprise kernel security update (IMPORTANT) | почти 11 лет назад | |||
ELSA-2014-1167 ELSA-2014-1167: kernel security and bug fix update (IMPORTANT) | почти 11 лет назад | |||
![]() | CVE-2014-0205 The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count. | CVSS2: 6.9 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2014-0205 The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count. | CVSS2: 6.9 | 0% Низкий | почти 11 лет назад |
![]() | CVE-2014-0205 The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count. | CVSS2: 6.9 | 0% Низкий | больше 10 лет назад |
CVE-2014-0205 The futex_wait function in kernel/futex.c in the Linux kernel before 2 ... | CVSS2: 6.9 | 0% Низкий | больше 10 лет назад | |
GHSA-cwrh-45v3-q8mf The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count. | 0% Низкий | около 3 лет назад | ||
![]() | CVE-2014-3917 kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. | CVSS2: 3.3 | 0% Низкий | около 11 лет назад |
![]() | CVE-2014-3917 kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. | CVSS2: 4.7 | 0% Низкий | около 11 лет назад |
![]() | CVE-2014-3917 kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. | CVSS2: 3.3 | 0% Низкий | около 11 лет назад |
CVE-2014-3917 kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDIT ... | CVSS2: 3.3 | 0% Низкий | около 11 лет назад | |
GHSA-qjxx-j28r-gvj2 kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. | 0% Низкий | около 3 лет назад | ||
ELSA-2014-3074 ELSA-2014-3074: unbreakable enterprise kernel security bug fix update (IMPORTANT) | почти 11 лет назад | |||
ELSA-2014-3072 ELSA-2014-3072: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 11 лет назад | |||
ELSA-2014-1281 ELSA-2014-1281: kernel security and bug fix update (MODERATE) | больше 10 лет назад | |||
ELSA-2014-1143 ELSA-2014-1143: kernel security and bug fix update (MODERATE) | почти 11 лет назад | |||
ELSA-2014-1143-1 ELSA-2014-1143-1: kernel security and bug fix update (MODERATE) | почти 11 лет назад | |||
![]() | BDU:2015-05843 Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации | CVSS2: 9.3 | больше 10 лет назад | |
![]() | BDU:2015-05842 Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации | CVSS2: 9.3 | больше 10 лет назад | |
![]() | BDU:2015-05841 Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации | CVSS2: 9.3 | больше 10 лет назад |
Уязвимостей на страницу