Количество 51
Количество 51
ELSA-2019-4532
ELSA-2019-4532: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4533
ELSA-2019-4533: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2018-1094
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.

CVE-2018-1094
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.

CVE-2018-1094
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.
CVE-2018-1094
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel th ...
GHSA-qqjj-7xjv-r736
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.

BDU:2018-00714
Уязвимость функции ext4_fill_super ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2019-4510
ELSA-2019-4510: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base ...
GHSA-qgp4-5xqg-pc3p
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

BDU:2019-00570
Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

SUSE-SU-2018:1762-1
Security update for the Linux Kernel

SUSE-SU-2018:1761-1
Security update for the Linux Kernel

openSUSE-SU-2018:1773-1
Security update for the Linux Kernel

CVE-2018-14609
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.

CVE-2018-14609
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2019-4532 ELSA-2019-4532: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
ELSA-2019-4533 ELSA-2019-4533: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
![]() | CVE-2018-1094 The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image. | CVSS3: 5.5 | 0% Низкий | около 7 лет назад |
![]() | CVE-2018-1094 The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image. | CVSS3: 4.6 | 0% Низкий | около 7 лет назад |
![]() | CVE-2018-1094 The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image. | CVSS3: 5.5 | 0% Низкий | около 7 лет назад |
CVE-2018-1094 The ext4_fill_super function in fs/ext4/super.c in the Linux kernel th ... | CVSS3: 5.5 | 0% Низкий | около 7 лет назад | |
GHSA-qqjj-7xjv-r736 The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2018-00714 Уязвимость функции ext4_fill_super ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 7 лет назад |
ELSA-2019-4510 ELSA-2019-4510: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 3.3 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
CVE-2018-17972 An issue was discovered in the proc_pid_stack function in fs/proc/base ... | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад | |
GHSA-qgp4-5xqg-pc3p An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2019-00570 Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
![]() | SUSE-SU-2018:1762-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | SUSE-SU-2018:1761-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | openSUSE-SU-2018:1773-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | CVE-2018-14609 An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized. | CVSS3: 5.5 | 0% Низкий | почти 7 лет назад |
![]() | CVE-2018-14609 An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized. | CVSS3: 4.6 | 0% Низкий | около 7 лет назад |
Уязвимостей на страницу