Логотип exploitDog
bind:"CVE-2022-29901" OR bind:"CVE-2024-56644"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-29901" OR bind:"CVE-2024-56644"

Количество 55

Количество 55

oracle-oval логотип

ELSA-2025-20019

5 месяцев назад

ELSA-2025-20019: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2024-56644

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table. There are several conditions that must be fulfilled for the leak to occur: * an ICMPv6 packet indicating a change of the MTU for the path is received, resulting in an exception dst being created * a TCP connection that uses the exception dst for routing packets must start timing out so that TCP begins retransmissions * after the exception dst expires, the FIB6 garbage collector must not run before TCP executes ip6_negative_advice() for the expired exception dst When TCP executes ip6_negative_advice() for an exception dst that has expired and if no other socket holds a reference to the exception dst, the refcount of the exception dst is 2, which corresponds to the increment made by dst_init() and the increment made by the T...

EPSS: Низкий
redhat логотип

CVE-2024-56644

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table. There are several conditions that must be fulfilled for the leak to occur: * an ICMPv6 packet indicating a change of the MTU for the path is received, resulting in an exception dst being created * a TCP connection that uses the exception dst for routing packets must start timing out so that TCP begins retransmissions * after the exception dst expires, the FIB6 garbage collector must not run before TCP executes ip6_negative_advice() for the expired exception dst When TCP executes ip6_negative_advice() for an exception dst that has expired and if no other socket holds a reference to the exception dst, the refcount of the exception dst is 2, which corresponds to the increment made by dst_init() and the increment made by the TCP ...

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2024-56644

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table. There are several conditions that must be fulfilled for the leak to occur: * an ICMPv6 packet indicating a change of the MTU for the path is received, resulting in an exception dst being created * a TCP connection that uses the exception dst for routing packets must start timing out so that TCP begins retransmissions * after the exception dst expires, the FIB6 garbage collector must not run before TCP executes ip6_negative_advice() for the expired exception dst When TCP executes ip6_negative_advice() for an exception dst that has expired and if no other socket holds a reference to the exception dst, the refcount of the exception dst is 2, which corresponds to the increment made by dst_init() and the increment made by th

EPSS: Низкий
debian логотип

CVE-2024-56644

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: n ...

EPSS: Низкий
ubuntu логотип

CVE-2022-29901

почти 3 года назад

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 5.6
EPSS: Низкий
redhat логотип

CVE-2022-29901

почти 3 года назад

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 5.6
EPSS: Низкий
nvd логотип

CVE-2022-29901

почти 3 года назад

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 5.6
EPSS: Низкий
debian логотип

CVE-2022-29901

почти 3 года назад

Intel microprocessor generations 6 to 8 are affected by a new Spectre ...

CVSS3: 5.6
EPSS: Низкий
github логотип

GHSA-4cgh-427p-hh6m

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table. There are several conditions that must be fulfilled for the leak to occur: * an ICMPv6 packet indicating a change of the MTU for the path is received, resulting in an exception dst being created * a TCP connection that uses the exception dst for routing packets must start timing out so that TCP begins retransmissions * after the exception dst expires, the FIB6 garbage collector must not run before TCP executes ip6_negative_advice() for the expired exception dst When TCP executes ip6_negative_advice() for an exception dst that has expired and if no other socket holds a reference to the exception dst, the refcount of the exception dst is 2, which corresponds to the increment made by dst_init() and the increment made by...

EPSS: Низкий
fstec логотип

BDU:2025-06094

7 месяцев назад

Уязвимость функции ip6_negative_advice() модуля net/ipv6/route.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-55c8-6r36-9g85

почти 3 года назад

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2022-04388

почти 3 года назад

Уязвимость микропрограммного обеспечения процессоров Intel и AMD, позволяющая нарушителю раскрыть защищаемую информацию из памяти ядра или осуществить атаку на хост-систему из виртуальных машин

CVSS3: 5.6
EPSS: Низкий
oracle-oval логотип

ELSA-2024-12433

около 1 года назад

ELSA-2024-12433: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9591

почти 3 года назад

ELSA-2022-9591: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9590

почти 3 года назад

ELSA-2022-9590: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12154

больше 1 года назад

ELSA-2024-12154: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12153

больше 1 года назад

ELSA-2024-12153: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12151

больше 1 года назад

ELSA-2024-12151: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9710

почти 3 года назад

ELSA-2022-9710: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2025-20019

ELSA-2025-20019: Unbreakable Enterprise kernel security update (IMPORTANT)

5 месяцев назад
ubuntu логотип
CVE-2024-56644

In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table. There are several conditions that must be fulfilled for the leak to occur: * an ICMPv6 packet indicating a change of the MTU for the path is received, resulting in an exception dst being created * a TCP connection that uses the exception dst for routing packets must start timing out so that TCP begins retransmissions * after the exception dst expires, the FIB6 garbage collector must not run before TCP executes ip6_negative_advice() for the expired exception dst When TCP executes ip6_negative_advice() for an exception dst that has expired and if no other socket holds a reference to the exception dst, the refcount of the exception dst is 2, which corresponds to the increment made by dst_init() and the increment made by the T...

0%
Низкий
6 месяцев назад
redhat логотип
CVE-2024-56644

In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table. There are several conditions that must be fulfilled for the leak to occur: * an ICMPv6 packet indicating a change of the MTU for the path is received, resulting in an exception dst being created * a TCP connection that uses the exception dst for routing packets must start timing out so that TCP begins retransmissions * after the exception dst expires, the FIB6 garbage collector must not run before TCP executes ip6_negative_advice() for the expired exception dst When TCP executes ip6_negative_advice() for an exception dst that has expired and if no other socket holds a reference to the exception dst, the refcount of the exception dst is 2, which corresponds to the increment made by dst_init() and the increment made by the TCP ...

CVSS3: 4.7
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2024-56644

In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table. There are several conditions that must be fulfilled for the leak to occur: * an ICMPv6 packet indicating a change of the MTU for the path is received, resulting in an exception dst being created * a TCP connection that uses the exception dst for routing packets must start timing out so that TCP begins retransmissions * after the exception dst expires, the FIB6 garbage collector must not run before TCP executes ip6_negative_advice() for the expired exception dst When TCP executes ip6_negative_advice() for an exception dst that has expired and if no other socket holds a reference to the exception dst, the refcount of the exception dst is 2, which corresponds to the increment made by dst_init() and the increment made by th

0%
Низкий
6 месяцев назад
debian логотип
CVE-2024-56644

In the Linux kernel, the following vulnerability has been resolved: n ...

0%
Низкий
6 месяцев назад
ubuntu логотип
CVE-2022-29901

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 5.6
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2022-29901

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 5.6
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-29901

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 5.6
0%
Низкий
почти 3 года назад
debian логотип
CVE-2022-29901

Intel microprocessor generations 6 to 8 are affected by a new Spectre ...

CVSS3: 5.6
0%
Низкий
почти 3 года назад
github логотип
GHSA-4cgh-427p-hh6m

In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table. There are several conditions that must be fulfilled for the leak to occur: * an ICMPv6 packet indicating a change of the MTU for the path is received, resulting in an exception dst being created * a TCP connection that uses the exception dst for routing packets must start timing out so that TCP begins retransmissions * after the exception dst expires, the FIB6 garbage collector must not run before TCP executes ip6_negative_advice() for the expired exception dst When TCP executes ip6_negative_advice() for an exception dst that has expired and if no other socket holds a reference to the exception dst, the refcount of the exception dst is 2, which corresponds to the increment made by dst_init() and the increment made by...

0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-06094

Уязвимость функции ip6_negative_advice() модуля net/ipv6/route.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
7 месяцев назад
github логотип
GHSA-55c8-6r36-9g85

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 6.5
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-04388

Уязвимость микропрограммного обеспечения процессоров Intel и AMD, позволяющая нарушителю раскрыть защищаемую информацию из памяти ядра или осуществить атаку на хост-систему из виртуальных машин

CVSS3: 5.6
0%
Низкий
почти 3 года назад
oracle-oval логотип
ELSA-2024-12433

ELSA-2024-12433: Unbreakable Enterprise kernel security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2022-9591

ELSA-2022-9591: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 3 года назад
oracle-oval логотип
ELSA-2022-9590

ELSA-2022-9590: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 3 года назад
oracle-oval логотип
ELSA-2024-12154

ELSA-2024-12154: Unbreakable Enterprise kernel-container security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12153

ELSA-2024-12153: Unbreakable Enterprise kernel-container security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12151

ELSA-2024-12151: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2022-9710

ELSA-2022-9710: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 3 года назад

Уязвимостей на страницу