Количество 174
Количество 174
ELSA-2019-4710
ELSA-2019-4710: Unbreakable Enterprise kernel security update (IMPORTANT)
CVE-2017-18208
The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
CVE-2017-18208
The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
CVE-2017-18208
The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
CVE-2017-18208
The madvise_willneed function in mm/madvise.c in the Linux kernel befo ...
GHSA-85g2-5cqr-rm5c
The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
SUSE-SU-2018:1080-1
Security update for the Linux Kernel
SUSE-SU-2018:0986-1
Security update for the Linux Kernel
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indir ...
SUSE-SU-2018:0785-1
Security update for the Linux Kernel
openSUSE-SU-2018:0781-1
Security update for the Linux Kernel
SUSE-SU-2018:0786-1
Security update for the Linux Kernel
CVE-2019-6133
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
CVE-2019-6133
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
CVE-2019-6133
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
CVE-2019-6133
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism ...
openSUSE-SU-2018:2237-1
Security update for kernel-firmware
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2019-4710 ELSA-2019-4710: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
CVE-2017-18208 The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping. | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад | |
CVE-2017-18208 The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping. | CVSS3: 5.5 | 0% Низкий | почти 8 лет назад | |
CVE-2017-18208 The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping. | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад | |
CVE-2017-18208 The madvise_willneed function in mm/madvise.c in the Linux kernel befo ... | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад | |
GHSA-85g2-5cqr-rm5c The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
SUSE-SU-2018:1080-1 Security update for the Linux Kernel | больше 7 лет назад | |||
SUSE-SU-2018:0986-1 Security update for the Linux Kernel | больше 7 лет назад | |||
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | CVSS3: 5.6 | 91% Критический | почти 8 лет назад | |
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | CVSS3: 5.6 | 91% Критический | почти 8 лет назад | |
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | CVSS3: 5.6 | 91% Критический | почти 8 лет назад | |
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indir ... | CVSS3: 5.6 | 91% Критический | почти 8 лет назад | |
SUSE-SU-2018:0785-1 Security update for the Linux Kernel | больше 7 лет назад | |||
openSUSE-SU-2018:0781-1 Security update for the Linux Kernel | больше 7 лет назад | |||
SUSE-SU-2018:0786-1 Security update for the Linux Kernel | больше 7 лет назад | |||
CVE-2019-6133 In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c. | CVSS3: 6.7 | 0% Низкий | почти 7 лет назад | |
CVE-2019-6133 In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c. | CVSS3: 7.3 | 0% Низкий | почти 7 лет назад | |
CVE-2019-6133 In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c. | CVSS3: 6.7 | 0% Низкий | почти 7 лет назад | |
CVE-2019-6133 In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism ... | CVSS3: 6.7 | 0% Низкий | почти 7 лет назад | |
openSUSE-SU-2018:2237-1 Security update for kernel-firmware | 91% Критический | больше 7 лет назад |
Уязвимостей на страницу