Логотип exploitDog
bind:"CVE-2018-18445" OR bind:"CVE-2018-17972" OR bind:"CVE-2018-9568"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-18445" OR bind:"CVE-2018-17972" OR bind:"CVE-2018-9568"

Количество 61

Количество 61

oracle-oval логотип

ELSA-2019-0512

больше 6 лет назад

ELSA-2019-0512: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2018-18445

больше 6 лет назад

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2018-18445

больше 6 лет назад

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2018-18445

больше 6 лет назад

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2018-18445

больше 6 лет назад

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before ...

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2019-4577

больше 6 лет назад

ELSA-2019-4577: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
github логотип

GHSA-c3vm-qh5c-27gq

около 3 лет назад

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2019-03124

больше 6 лет назад

Уязвимость механизма проверки BPF ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2018-17972

больше 6 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2018-17972

больше 6 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 3.3
EPSS: Низкий
nvd логотип

CVE-2018-17972

больше 6 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2018-17972

больше 6 лет назад

An issue was discovered in the proc_pid_stack function in fs/proc/base ...

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3593-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3589-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2018-9568

больше 6 лет назад

In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2018-9568

больше 7 лет назад

In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2018-9568

больше 6 лет назад

In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2018-9568

больше 6 лет назад

In sk_clone_lock of sock.c, there is a possible memory corruption due ...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:3658-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3934-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2019-0512

ELSA-2019-0512: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 6 лет назад
ubuntu логотип
CVE-2018-18445

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-18445

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

CVSS3: 4.7
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-18445

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-18445

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before ...

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
oracle-oval логотип
ELSA-2019-4577

ELSA-2019-4577: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
github логотип
GHSA-c3vm-qh5c-27gq

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-03124

Уязвимость механизма проверки BPF ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 3.3
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-17972

An issue was discovered in the proc_pid_stack function in fs/proc/base ...

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:3593-1

Security update for the Linux Kernel

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:3589-1

Security update for the Linux Kernel

больше 6 лет назад
ubuntu логотип
CVE-2018-9568

In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-9568

In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.

CVSS3: 7
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-9568

In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-9568

In sk_clone_lock of sock.c, there is a possible memory corruption due ...

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2018:3658-1

Security update for the Linux Kernel

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:3934-1

Security update for the Linux Kernel

больше 6 лет назад

Уязвимостей на страницу