Логотип exploitDog
bind:"CVE-2018-17972" OR bind:"CVE-2019-1125" OR bind:"CVE-2019-5489" OR bind:"CVE-2017-17805"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-17972" OR bind:"CVE-2019-1125" OR bind:"CVE-2019-5489" OR bind:"CVE-2017-17805"

Количество 84

Количество 84

oracle-oval логотип

ELSA-2019-2473

около 6 лет назад

ELSA-2019-2473: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4541

больше 6 лет назад

ELSA-2019-4541: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2018-17972

почти 7 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2018-17972

около 7 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 3.3
EPSS: Низкий
nvd логотип

CVE-2018-17972

почти 7 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2018-17972

почти 7 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base ...

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1692-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1533-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14089-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
github логотип

GHSA-qgp4-5xqg-pc3p

больше 3 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2019-00570

почти 7 лет назад

Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1534-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1532-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1527-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4531

больше 6 лет назад

ELSA-2019-4531: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-0512

больше 6 лет назад

ELSA-2019-0512: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2019-1125

около 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.6
EPSS: Средний
redhat логотип

CVE-2019-1125

около 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.9
EPSS: Средний
nvd логотип

CVE-2019-1125

около 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a

CVSS3: 5.6
EPSS: Средний
msrc логотип

CVE-2019-1125

около 6 лет назад

Windows Kernel Information Disclosure Vulnerability

CVSS3: 5.6
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2019-2473

ELSA-2019-2473: kernel security and bug fix update (IMPORTANT)

около 6 лет назад
oracle-oval логотип
ELSA-2019-4541

ELSA-2019-4541: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
ubuntu логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
0%
Низкий
почти 7 лет назад
redhat логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 3.3
0%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
0%
Низкий
почти 7 лет назад
debian логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base ...

CVSS3: 5.5
0%
Низкий
почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:1692-1

Security update for the Linux Kernel

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1533-1

Security update for the Linux Kernel

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14089-1

Security update for the Linux Kernel

больше 6 лет назад
github логотип
GHSA-qgp4-5xqg-pc3p

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-00570

Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.5
0%
Низкий
почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:1534-1

Security update for the Linux Kernel

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1532-1

Security update for the Linux Kernel

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1527-1

Security update for the Linux Kernel

больше 6 лет назад
oracle-oval логотип
ELSA-2019-4531

ELSA-2019-4531: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2019-0512

ELSA-2019-0512: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 6 лет назад
ubuntu логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.6
13%
Средний
около 6 лет назад
redhat логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.9
13%
Средний
около 6 лет назад
nvd логотип
CVE-2019-1125

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a

CVSS3: 5.6
13%
Средний
около 6 лет назад
msrc логотип
CVE-2019-1125

Windows Kernel Information Disclosure Vulnerability

CVSS3: 5.6
13%
Средний
около 6 лет назад

Уязвимостей на страницу