Количество 17
Количество 17
ELSA-2018-4062
ELSA-2018-4062: Unbreakable Enterprise kernel security update (IMPORTANT)
CVE-2017-17052
The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the ->exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program.
CVE-2017-17052
The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the ->exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program.
CVE-2017-17052
The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the ->exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program.
CVE-2017-17052
The mm_init function in kernel/fork.c in the Linux kernel before 4.12. ...
CVE-2017-7518
A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
CVE-2017-7518
A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
CVE-2017-7518
A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
CVE-2017-7518
A flaw was found in the Linux kernel before version 4.12 in the way th ...
GHSA-5mx2-ppx6-jrqv
The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the ->exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program.
GHSA-hwr9-p63p-wq87
A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
openSUSE-SU-2017:1825-1
Security update for the Linux Kernel
ELSA-2018-0395
ELSA-2018-0395: kernel security and bug fix update (IMPORTANT)
SUSE-SU-2017:2869-1
Security update for the Linux Kernel
SUSE-SU-2017:2956-1
Security update for the Linux Kernel
SUSE-SU-2017:2908-1
Security update for the Linux Kernel
SUSE-SU-2017:2920-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2018-4062 ELSA-2018-4062: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад | |||
CVE-2017-17052 The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the ->exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад | |
CVE-2017-17052 The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the ->exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. | CVSS3: 6.1 | 0% Низкий | около 8 лет назад | |
CVE-2017-17052 The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the ->exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад | |
CVE-2017-17052 The mm_init function in kernel/fork.c in the Linux kernel before 4.12. ... | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад | |
CVE-2017-7518 A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this. | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад | |
CVE-2017-7518 A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this. | CVSS3: 5.5 | 0% Низкий | больше 8 лет назад | |
CVE-2017-7518 A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this. | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад | |
CVE-2017-7518 A flaw was found in the Linux kernel before version 4.12 in the way th ... | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад | |
GHSA-5mx2-ppx6-jrqv The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the ->exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
GHSA-hwr9-p63p-wq87 A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
openSUSE-SU-2017:1825-1 Security update for the Linux Kernel | больше 8 лет назад | |||
ELSA-2018-0395 ELSA-2018-0395: kernel security and bug fix update (IMPORTANT) | больше 7 лет назад | |||
SUSE-SU-2017:2869-1 Security update for the Linux Kernel | около 8 лет назад | |||
SUSE-SU-2017:2956-1 Security update for the Linux Kernel | около 8 лет назад | |||
SUSE-SU-2017:2908-1 Security update for the Linux Kernel | около 8 лет назад | |||
SUSE-SU-2017:2920-1 Security update for the Linux Kernel | около 8 лет назад |
Уязвимостей на страницу