Количество 24
Количество 24

CVE-2023-46813
An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.

CVE-2023-46813
An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.

CVE-2023-46813
An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.

CVE-2023-46813
CVE-2023-46813
An issue was discovered in the Linux kernel before 6.5.9, exploitable ...
GHSA-w26h-mgrc-mcqq
An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.

BDU:2023-07236
Уязвимость ядра операционной системы Linux, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю выполнить произвольный код.

SUSE-SU-2024:1063-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP4)
ELSA-2024-12187
ELSA-2024-12187: kernel security update (IMPORTANT)

SUSE-SU-2024:1045-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5)

SUSE-SU-2024:1023-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5)

SUSE-SU-2024:0995-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5)

SUSE-SU-2024:0986-1
Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5)

SUSE-SU-2024:1097-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)

SUSE-SU-2024:1039-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)
ELSA-2024-12159
ELSA-2024-12159: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2023:4351-1
Security update for the Linux Kernel

SUSE-SU-2023:4375-1
Security update for the Linux Kernel

SUSE-SU-2023:4345-1
Security update for the Linux Kernel

SUSE-SU-2023:4414-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-46813 An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it. | CVSS3: 7 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-46813 An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it. | CVSS3: 7 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-46813 An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it. | CVSS3: 7 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 7 | 0% Низкий | больше 1 года назад | |
CVE-2023-46813 An issue was discovered in the Linux kernel before 6.5.9, exploitable ... | CVSS3: 7 | 0% Низкий | больше 1 года назад | |
GHSA-w26h-mgrc-mcqq An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it. | CVSS3: 7 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2023-07236 Уязвимость ядра операционной системы Linux, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю выполнить произвольный код. | CVSS3: 7 | 0% Низкий | больше 1 года назад |
![]() | SUSE-SU-2024:1063-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP4) | около 1 года назад | ||
ELSA-2024-12187 ELSA-2024-12187: kernel security update (IMPORTANT) | больше 1 года назад | |||
![]() | SUSE-SU-2024:1045-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1023-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:0995-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:0986-1 Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1097-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1039-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) | около 1 года назад | ||
ELSA-2024-12159 ELSA-2024-12159: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 1 года назад | |||
![]() | SUSE-SU-2023:4351-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4375-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4345-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4414-1 Security update for the Linux Kernel | больше 1 года назад |
Уязвимостей на страницу