Количество 41
Количество 41
ELSA-2022-1198
ELSA-2022-1198: kernel security, bug fix, and enhancement update (IMPORTANT)

CVE-2021-4028
A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.

CVE-2021-4028
A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.

CVE-2021-4028
A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.
CVE-2021-4028
A flaw in the Linux kernel's implementation of RDMA communications man ...

CVE-2021-4083
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.

CVE-2021-4083
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.

CVE-2021-4083
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.

CVE-2021-4083
CVE-2021-4083
A read-after-free memory flaw was found in the Linux kernel's garbage ...
GHSA-qfcc-9m6r-r23m
A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.

BDU:2022-00733
Уязвимость менеджера соединений RDMA ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
GHSA-rcrv-64p3-px35
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.

BDU:2022-00095
Уязвимость реализации функций close() и fget() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
ELSA-2022-1550
ELSA-2022-1550: kernel security and bug fix update (IMPORTANT)

SUSE-SU-2022:0552-1
Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3)

SUSE-SU-2022:0436-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP3)

SUSE-SU-2022:0270-1
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3)

SUSE-SU-2022:0463-1
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3)

SUSE-SU-2022:0418-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2022-1198 ELSA-2022-1198: kernel security, bug fix, and enhancement update (IMPORTANT) | около 3 лет назад | |||
![]() | CVE-2021-4028 A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system. | CVSS3: 7.8 | 0% Низкий | почти 3 года назад |
![]() | CVE-2021-4028 A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system. | CVSS3: 7 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-4028 A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system. | CVSS3: 7.8 | 0% Низкий | почти 3 года назад |
CVE-2021-4028 A flaw in the Linux kernel's implementation of RDMA communications man ... | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
![]() | CVE-2021-4083 A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4. | CVSS3: 7 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-4083 A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4. | CVSS3: 7.4 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-4083 A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4. | CVSS3: 7 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 7 | 0% Низкий | больше 3 лет назад | |
CVE-2021-4083 A read-after-free memory flaw was found in the Linux kernel's garbage ... | CVSS3: 7 | 0% Низкий | больше 3 лет назад | |
GHSA-qfcc-9m6r-r23m A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system. | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
![]() | BDU:2022-00733 Уязвимость менеджера соединений RDMA ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код | CVSS3: 7 | 0% Низкий | больше 3 лет назад |
GHSA-rcrv-64p3-px35 A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4. | CVSS3: 7 | 0% Низкий | больше 3 лет назад | |
![]() | BDU:2022-00095 Уязвимость реализации функций close() и fget() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии | CVSS3: 7.4 | 0% Низкий | больше 3 лет назад |
ELSA-2022-1550 ELSA-2022-1550: kernel security and bug fix update (IMPORTANT) | около 3 лет назад | |||
![]() | SUSE-SU-2022:0552-1 Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0436-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP3) | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0270-1 Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3) | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0463-1 Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3) | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0418-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3) | больше 3 лет назад |
Уязвимостей на страницу