Количество 36
Количество 36
CVE-2021-38160
In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior
CVE-2021-38160
In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior
CVE-2021-38160
In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior
CVE-2021-38160
In drivers/char/virtio_console.c in the Linux kernel before 5.13.4 data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior
CVE-2021-38160
In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, da ...
GHSA-fjw9-4q3j-vpq4
In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size.
BDU:2021-04848
Уязвимость драйвера drivers/char/virtio_console.c ядра операционной системы Linux, позволяющая нарушителю вызвать повреждение стека
SUSE-SU-2021:3443-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2)
SUSE-SU-2021:3374-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP3)
SUSE-SU-2021:3459-1
Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3)
SUSE-SU-2021:3440-1
Security update for the Linux Kernel (Live Patch 22 for SLE 15)
SUSE-SU-2021:3401-1
Security update for the Linux Kernel (Live Patch 23 for SLE 15)
SUSE-SU-2021:3371-1
Security update for the Linux Kernel (Live Patch 24 for SLE 15)
SUSE-SU-2021:3360-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)
ELSA-2021-9460
ELSA-2021-9460: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9458
ELSA-2021-9458: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9488
ELSA-2021-9488: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9485
ELSA-2021-9485: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2021:3192-1
Security update for the Linux Kernel
openSUSE-SU-2021:1271-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-38160 In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
CVE-2021-38160 In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior | 0% Низкий | больше 4 лет назад | ||
CVE-2021-38160 In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
CVE-2021-38160 In drivers/char/virtio_console.c in the Linux kernel before 5.13.4 data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
CVE-2021-38160 In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, da ... | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
GHSA-fjw9-4q3j-vpq4 In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
BDU:2021-04848 Уязвимость драйвера drivers/char/virtio_console.c ядра операционной системы Linux, позволяющая нарушителю вызвать повреждение стека | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
SUSE-SU-2021:3443-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) | около 4 лет назад | |||
SUSE-SU-2021:3374-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP3) | около 4 лет назад | |||
SUSE-SU-2021:3459-1 Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) | около 4 лет назад | |||
SUSE-SU-2021:3440-1 Security update for the Linux Kernel (Live Patch 22 for SLE 15) | около 4 лет назад | |||
SUSE-SU-2021:3401-1 Security update for the Linux Kernel (Live Patch 23 for SLE 15) | около 4 лет назад | |||
SUSE-SU-2021:3371-1 Security update for the Linux Kernel (Live Patch 24 for SLE 15) | около 4 лет назад | |||
SUSE-SU-2021:3360-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3) | около 4 лет назад | |||
ELSA-2021-9460 ELSA-2021-9460: Unbreakable Enterprise kernel security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-9458 ELSA-2021-9458: Unbreakable Enterprise kernel-container security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-9488 ELSA-2021-9488: Unbreakable Enterprise kernel-container security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-9485 ELSA-2021-9485: Unbreakable Enterprise kernel security update (IMPORTANT) | около 4 лет назад | |||
SUSE-SU-2021:3192-1 Security update for the Linux Kernel | около 4 лет назад | |||
openSUSE-SU-2021:1271-1 Security update for the Linux Kernel | около 4 лет назад |
Уязвимостей на страницу