Количество 137
Количество 137

BDU:2023-02165
Уязвимость фильтра индексирования системы контроля трафика tcindex (net/sched/cls_tcindex.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

ROS-20241002-02
Уязвимость kernel-lt

CVE-2023-1829
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

CVE-2023-1829
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

CVE-2023-1829
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

CVE-2023-1829
CVE-2023-1829
A use-after-free vulnerability in the Linux Kernel traffic control ind ...

SUSE-SU-2024:2149-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

SUSE-SU-2024:1275-1
Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

SUSE-SU-2024:0695-1
Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)

SUSE-SU-2024:0665-1
Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5)

SUSE-SU-2024:0410-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2)

SUSE-SU-2024:0394-1
Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)

SUSE-SU-2024:0377-1
Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP1)

SUSE-SU-2023:4845-1
Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3)

SUSE-SU-2023:4804-1
Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP2)

SUSE-SU-2023:4774-1
Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP1)

SUSE-SU-2023:4264-1
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)

SUSE-SU-2023:4097-1
Security update for suse-module-tools
GHSA-4x82-r4q4-7g8x
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2023-02165 Уязвимость фильтра индексирования системы контроля трафика tcindex (net/sched/cls_tcindex.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | ROS-20241002-02 Уязвимость kernel-lt | CVSS3: 7.8 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2023-1829 A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-1829 A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. | CVSS3: 7.4 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-1829 A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-1829 A use-after-free vulnerability in the Linux Kernel traffic control ind ... | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2024:2149-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1275-1 Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:0695-1 Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0665-1 Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5) | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0410-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2) | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0394-1 Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3) | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0377-1 Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP1) | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4845-1 Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3) | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4804-1 Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP2) | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4774-1 Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP1) | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4264-1 Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3) | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4097-1 Security update for suse-module-tools | 0% Низкий | больше 1 года назад | |
GHSA-4x82-r4q4-7g8x A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
Уязвимостей на страницу