Логотип exploitDog
bind:CVE-2018-14678
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-14678

Количество 9

Количество 9

ubuntu логотип

CVE-2018-14678

почти 7 лет назад

An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2018-14678

почти 7 лет назад

An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2018-14678

почти 7 лет назад

An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2018-14678

почти 7 лет назад

An issue was discovered in the Linux kernel through 4.17.11, as used i ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-mmph-rg95-j757

около 3 лет назад

An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2018-4210

почти 7 лет назад

ELSA-2018-4210: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2019-01344

почти 7 лет назад

Уязвимость функции xen_failsafe_callback гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2018-4242

больше 6 лет назад

ELSA-2018-4242: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3084-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-14678

An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.

CVSS3: 7.8
0%
Низкий
почти 7 лет назад
redhat логотип
CVE-2018-14678

An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.

CVSS3: 7
0%
Низкий
почти 7 лет назад
nvd логотип
CVE-2018-14678

An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.

CVSS3: 7.8
0%
Низкий
почти 7 лет назад
debian логотип
CVE-2018-14678

An issue was discovered in the Linux kernel through 4.17.11, as used i ...

CVSS3: 7.8
0%
Низкий
почти 7 лет назад
github логотип
GHSA-mmph-rg95-j757

An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2018-4210

ELSA-2018-4210: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 7 лет назад
fstec логотип
BDU:2019-01344

Уязвимость функции xen_failsafe_callback гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

CVSS3: 7.8
0%
Низкий
почти 7 лет назад
oracle-oval логотип
ELSA-2018-4242

ELSA-2018-4242: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:3084-1

Security update for the Linux Kernel

больше 6 лет назад

Уязвимостей на страницу