Количество 15
Количество 15
CVE-2021-34866
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689.
CVE-2021-34866
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689.
CVE-2021-34866
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689.
CVE-2021-34866
This vulnerability allows local attackers to escalate privileges on af ...
GHSA-mrjq-f7fw-fmg2
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689.
BDU:2021-05536
Уязвимость реализации функции check_map_func_compatibility() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии
SUSE-SU-2021:3742-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3)
SUSE-SU-2021:3718-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP3)
SUSE-SU-2021:3738-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)
openSUSE-SU-2021:3655-1
Security update for the Linux Kernel
openSUSE-SU-2021:3641-1
Security update for the Linux Kernel
SUSE-SU-2021:3655-1
Security update for the Linux Kernel
SUSE-SU-2021:3641-1
Security update for the Linux Kernel
openSUSE-SU-2021:3675-1
Security update for the Linux Kernel
SUSE-SU-2021:3675-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-34866 This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689. | CVSS3: 7.8 | 0% Низкий | около 4 лет назад | |
CVE-2021-34866 This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689. | CVSS3: 6.7 | 0% Низкий | больше 4 лет назад | |
CVE-2021-34866 This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689. | CVSS3: 7.8 | 0% Низкий | около 4 лет назад | |
CVE-2021-34866 This vulnerability allows local attackers to escalate privileges on af ... | CVSS3: 7.8 | 0% Низкий | около 4 лет назад | |
GHSA-mrjq-f7fw-fmg2 This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689. | CVSS3: 7.8 | 0% Низкий | около 4 лет назад | |
BDU:2021-05536 Уязвимость реализации функции check_map_func_compatibility() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
SUSE-SU-2021:3742-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3) | около 4 лет назад | |||
SUSE-SU-2021:3718-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP3) | около 4 лет назад | |||
SUSE-SU-2021:3738-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3) | около 4 лет назад | |||
openSUSE-SU-2021:3655-1 Security update for the Linux Kernel | около 4 лет назад | |||
openSUSE-SU-2021:3641-1 Security update for the Linux Kernel | около 4 лет назад | |||
SUSE-SU-2021:3655-1 Security update for the Linux Kernel | около 4 лет назад | |||
SUSE-SU-2021:3641-1 Security update for the Linux Kernel | около 4 лет назад | |||
openSUSE-SU-2021:3675-1 Security update for the Linux Kernel | около 4 лет назад | |||
SUSE-SU-2021:3675-1 Security update for the Linux Kernel | около 4 лет назад |
Уязвимостей на страницу