Логотип exploitDog
bind:"CVE-2023-1829"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-1829"

Количество 137

Количество 137

ubuntu логотип

CVE-2023-1829

около 2 лет назад

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-1829

около 2 лет назад

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2023-1829

около 2 лет назад

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-1829

около 2 лет назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-1829

около 2 лет назад

A use-after-free vulnerability in the Linux Kernel traffic control ind ...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2149-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1275-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0695-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0665-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0410-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0394-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0377-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP1)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4845-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4804-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4774-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP1)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4264-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4097-1

больше 1 года назад

Security update for suse-module-tools

EPSS: Низкий
github логотип

GHSA-4x82-r4q4-7g8x

почти 2 года назад

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-02165

больше 2 лет назад

Уязвимость фильтра индексирования системы контроля трафика tcindex (net/sched/cls_tcindex.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2147-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-1829

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

CVSS3: 7.8
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-1829

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

CVSS3: 7.4
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-1829

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

CVSS3: 7.8
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 7.8
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-1829

A use-after-free vulnerability in the Linux Kernel traffic control ind ...

CVSS3: 7.8
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:2149-1

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1275-1

Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0695-1

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0665-1

Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5)

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0410-1

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2)

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0394-1

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0377-1

Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP1)

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4845-1

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3)

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4804-1

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP2)

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4774-1

Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP1)

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4264-1

Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4097-1

Security update for suse-module-tools

0%
Низкий
больше 1 года назад
github логотип
GHSA-4x82-r4q4-7g8x

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-02165

Уязвимость фильтра индексирования системы контроля трафика tcindex (net/sched/cls_tcindex.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:2147-1

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

около 1 года назад

Уязвимостей на страницу