Количество 51
Количество 51
ELSA-2022-7318
ELSA-2022-7318: kernel security, bug fix, and enhancement update (IMPORTANT)

CVE-2022-2585
It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.

CVE-2022-2585
It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.

CVE-2022-2585
It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.

CVE-2022-2585
CVE-2022-2585
It was discovered that when exec'ing from a non-leader thread, armed P ...

CVE-2022-30594
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.

CVE-2022-30594
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.

CVE-2022-30594
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.

CVE-2022-30594
CVE-2022-30594
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTR ...

BDU:2022-05633
Уязвимость компонента POSIX CPU ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2022:2010-1
Security update for the Linux Kernel (Live Patch 44 for SLE 12 SP3)

SUSE-SU-2022:1988-1
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP3)

SUSE-SU-2022:1949-1
Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1)

SUSE-SU-2022:1940-1
Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP4)
GHSA-c23x-r777-vmjw
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.

BDU:2022-03004
Уязвимость системного вызова PTRACE_SEIZE безопасного режима вычислений seccomp ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

SUSE-SU-2022:3108-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)

SUSE-SU-2022:2006-1
Security update for the Linux Kernel (Live Patch 43 for SLE 12 SP3)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2022-7318 ELSA-2022-7318: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 2 лет назад | |||
![]() | CVE-2022-2585 It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2022-2585 It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free. | CVSS3: 7.8 | 0% Низкий | почти 3 года назад |
![]() | CVE-2022-2585 It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
CVE-2022-2585 It was discovered that when exec'ing from a non-leader thread, armed P ... | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2022-30594 The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-30594 The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-30594 The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
CVE-2022-30594 The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTR ... | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2022-05633 Уязвимость компонента POSIX CPU ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | почти 3 года назад |
![]() | SUSE-SU-2022:2010-1 Security update for the Linux Kernel (Live Patch 44 for SLE 12 SP3) | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1988-1 Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP3) | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1949-1 Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1) | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1940-1 Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP4) | 0% Низкий | около 3 лет назад | |
GHSA-c23x-r777-vmjw The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2022-03004 Уязвимость системного вызова PTRACE_SEIZE безопасного режима вычислений seccomp ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 8.4 | 0% Низкий | около 3 лет назад |
![]() | SUSE-SU-2022:3108-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4) | почти 3 года назад | ||
![]() | SUSE-SU-2022:2006-1 Security update for the Linux Kernel (Live Patch 43 for SLE 12 SP3) | около 3 лет назад |
Уязвимостей на страницу