Количество 22
Количество 22

CVE-2020-10781
A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.

CVE-2020-10781
A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.

CVE-2020-10781
A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.

CVE-2020-10781
CVE-2020-10781
A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel ...
GHSA-93vf-4x6g-q64v
A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.

BDU:2021-02144
Уязвимость модуля ZRAM ядра операционных систем Linux, Ubuntu и OpenSUSE Leap, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2020:2102-1
Security update for the Linux Kernel
ELSA-2020-5848
ELSA-2020-5848: Unbreakable Enterprise kernel security update (IMPORTANT)

openSUSE-SU-2020:1236-1
Security update for the Linux Kernel
ELSA-2020-5844
ELSA-2020-5844: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2020:2122-1
Security update for the Linux Kernel

SUSE-SU-2020:2119-1
Security update for the Linux Kernel
ELSA-2020-5885
ELSA-2020-5885: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2020:2103-1
Security update for the Linux Kernel

SUSE-SU-2020:2107-1
Security update for the Linux Kernel

openSUSE-SU-2020:1153-1
Security update for the Linux Kernel

SUSE-SU-2020:2105-1
Security update for the Linux Kernel

SUSE-SU-2021:0438-1
Security update for the Linux Kernel
ELSA-2020-5845
ELSA-2020-5845: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2020-10781 A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable. | CVSS3: 5.5 | 0% Низкий | почти 5 лет назад |
![]() | CVE-2020-10781 A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable. | CVSS3: 5.5 | 0% Низкий | около 5 лет назад |
![]() | CVE-2020-10781 A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable. | CVSS3: 5.5 | 0% Низкий | почти 5 лет назад |
![]() | CVSS3: 5.5 | 0% Низкий | больше 4 лет назад | |
CVE-2020-10781 A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel ... | CVSS3: 5.5 | 0% Низкий | почти 5 лет назад | |
GHSA-93vf-4x6g-q64v A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2021-02144 Уязвимость модуля ZRAM ядра операционных систем Linux, Ubuntu и OpenSUSE Leap, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | почти 5 лет назад |
![]() | SUSE-SU-2020:2102-1 Security update for the Linux Kernel | почти 5 лет назад | ||
ELSA-2020-5848 ELSA-2020-5848: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 5 лет назад | |||
![]() | openSUSE-SU-2020:1236-1 Security update for the Linux Kernel | почти 5 лет назад | ||
ELSA-2020-5844 ELSA-2020-5844: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 5 лет назад | |||
![]() | SUSE-SU-2020:2122-1 Security update for the Linux Kernel | почти 5 лет назад | ||
![]() | SUSE-SU-2020:2119-1 Security update for the Linux Kernel | почти 5 лет назад | ||
ELSA-2020-5885 ELSA-2020-5885: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
![]() | SUSE-SU-2020:2103-1 Security update for the Linux Kernel | почти 5 лет назад | ||
![]() | SUSE-SU-2020:2107-1 Security update for the Linux Kernel | почти 5 лет назад | ||
![]() | openSUSE-SU-2020:1153-1 Security update for the Linux Kernel | почти 5 лет назад | ||
![]() | SUSE-SU-2020:2105-1 Security update for the Linux Kernel | почти 5 лет назад | ||
![]() | SUSE-SU-2021:0438-1 Security update for the Linux Kernel | больше 4 лет назад | ||
ELSA-2020-5845 ELSA-2020-5845: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 5 лет назад |
Уязвимостей на страницу