Количество 131
Количество 131
ELSA-2024-12069
ELSA-2024-12069: kernel security update (IMPORTANT)

CVE-2023-2162
A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.

CVE-2023-2162
A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.

CVE-2023-2162
A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.

CVE-2023-2162
CVE-2023-2162
A use-after-free vulnerability was found in iscsi_sw_tcp_session_creat ...
GHSA-w379-vm3v-fj7p
A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.

BDU:2023-02528
Уязвимость драйвере SCSI ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации

SUSE-SU-2023:2395-1
Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP5)

SUSE-SU-2023:4035-1
Security update for the Linux Kernel

SUSE-SU-2023:4030-1
Security update for the Linux Kernel
ELSA-2024-12094
ELSA-2024-12094: kernel security update (IMPORTANT)

SUSE-SU-2023:4095-1
Security update for the Linux Kernel

CVE-2023-42753
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.

CVE-2023-42753
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.

CVE-2023-42753
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.

CVE-2023-42753
CVE-2023-42753
An array indexing vulnerability was found in the netfilter subsystem o ...

CVE-2023-4622
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.

CVE-2023-4622
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2024-12069 ELSA-2024-12069: kernel security update (IMPORTANT) | больше 1 года назад | |||
![]() | CVE-2023-2162 A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-2162 A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information. | CVSS3: 6.6 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-2162 A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад |
![]() | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-2162 A use-after-free vulnerability was found in iscsi_sw_tcp_session_creat ... | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
GHSA-w379-vm3v-fj7p A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-02528 Уязвимость драйвере SCSI ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2023:2395-1 Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP5) | около 2 лет назад | ||
![]() | SUSE-SU-2023:4035-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4030-1 Security update for the Linux Kernel | больше 1 года назад | ||
ELSA-2024-12094 ELSA-2024-12094: kernel security update (IMPORTANT) | больше 1 года назад | |||
![]() | SUSE-SU-2023:4095-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | CVE-2023-42753 An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system. | CVSS3: 7 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-42753 An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system. | CVSS3: 7 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-42753 An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system. | CVSS3: 7 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
CVE-2023-42753 An array indexing vulnerability was found in the netfilter subsystem o ... | CVSS3: 7 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2023-4622 A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4622 A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c. | CVSS3: 6.6 | 0% Низкий | почти 2 года назад |
Уязвимостей на страницу