Количество 30
Количество 30

BDU:2023-03677
Уязвимость подсистемы Netfilter ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVE-2023-3390
A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.

CVE-2023-3390
A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.

CVE-2023-3390
A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
CVE-2023-3390
A use-after-free vulnerability was found in the Linux kernel's netfilt ...
GHSA-vj8j-762w-6jmv
A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.

SUSE-SU-2023:4279-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2)

SUSE-SU-2023:4245-1
Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP2)
ELSA-2023-12839
ELSA-2023-12839: kernel security update (IMPORTANT)

ROS-20230904-02
Множественные уязвимости ядра ОС

ROS-20230904-01
Множественные уязвимости ядра ОС

SUSE-SU-2023:4326-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)

SUSE-SU-2023:4308-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5)

SUSE-SU-2023:4285-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4)

SUSE-SU-2023:4267-1
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP4)

SUSE-SU-2023:4239-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP3)

SUSE-SU-2023:4219-1
Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP3)

SUSE-SU-2023:4201-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP4)

SUSE-SU-2023:4175-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5)

SUSE-SU-2023:4166-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2023-03677 Уязвимость подсистемы Netfilter ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-3390 A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-3390 A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-3390 A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
CVE-2023-3390 A use-after-free vulnerability was found in the Linux kernel's netfilt ... | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
GHSA-vj8j-762w-6jmv A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:4279-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4245-1 Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP2) | больше 1 года назад | ||
ELSA-2023-12839 ELSA-2023-12839: kernel security update (IMPORTANT) | больше 1 года назад | |||
![]() | ROS-20230904-02 Множественные уязвимости ядра ОС | CVSS3: 9.3 | почти 2 года назад | |
![]() | ROS-20230904-01 Множественные уязвимости ядра ОС | CVSS3: 9.3 | почти 2 года назад | |
![]() | SUSE-SU-2023:4326-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4308-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4285-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4267-1 Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP4) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4239-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP3) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4219-1 Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP3) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4201-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP4) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4175-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4166-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) | больше 1 года назад |
Уязвимостей на страницу