Количество 30
Количество 30
ELSA-2022-6003
ELSA-2022-6003: kernel security, bug fix, and enhancement update (MODERATE)

CVE-2022-0494
A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.

CVE-2022-0494
A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.

CVE-2022-0494
A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.

CVE-2022-0494
CVE-2022-0494
A kernel information leak flaw was identified in the scsi_ioctl functi ...

CVE-2022-1055
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5

CVE-2022-1055
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5

CVE-2022-1055
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5

CVE-2022-1055
CVE-2022-1055
A use-after-free exists in the Linux Kernel in tc_new_tfilter that cou ...
GHSA-c6f2-mj5c-wfq2
A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.

BDU:2022-03400
Уязвимость функции scsi_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
GHSA-wmc5-hv62-89g7
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5

BDU:2022-01644
Уязвимость реализации функции tc_new_tfilter() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии

SUSE-SU-2022:1453-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP3)

SUSE-SU-2022:1369-1
Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3)

SUSE-SU-2022:1326-1
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3)

RLSA-2022:7110
Important: kernel security, bug fix, and enhancement update
ELSA-2022-7110
ELSA-2022-7110: kernel security, bug fix, and enhancement update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2022-6003 ELSA-2022-6003: kernel security, bug fix, and enhancement update (MODERATE) | почти 3 года назад | |||
![]() | CVE-2022-0494 A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality. | CVSS3: 4.4 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-0494 A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality. | CVSS3: 4.4 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2022-0494 A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality. | CVSS3: 4.4 | 0% Низкий | около 3 лет назад |
![]() | CVSS3: 4.4 | 0% Низкий | около 3 лет назад | |
CVE-2022-0494 A kernel information leak flaw was identified in the scsi_ioctl functi ... | CVSS3: 4.4 | 0% Низкий | около 3 лет назад | |
![]() | CVE-2022-1055 A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 | CVSS3: 7.8 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-1055 A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2022-1055 A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 | CVSS3: 7.8 | 0% Низкий | около 3 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
CVE-2022-1055 A use-after-free exists in the Linux Kernel in tc_new_tfilter that cou ... | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
GHSA-c6f2-mj5c-wfq2 A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality. | CVSS3: 4.4 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2022-03400 Уязвимость функции scsi_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 4.4 | 0% Низкий | больше 3 лет назад |
GHSA-wmc5-hv62-89g7 A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2022-01644 Уязвимость реализации функции tc_new_tfilter() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад |
![]() | SUSE-SU-2022:1453-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP3) | около 3 лет назад | ||
![]() | SUSE-SU-2022:1369-1 Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3) | около 3 лет назад | ||
![]() | SUSE-SU-2022:1326-1 Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3) | около 3 лет назад | ||
![]() | RLSA-2022:7110 Important: kernel security, bug fix, and enhancement update | больше 2 лет назад | ||
ELSA-2022-7110 ELSA-2022-7110: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 2 лет назад |
Уязвимостей на страницу