Количество 21
Количество 21
GHSA-2679-jq7r-8cph
A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.

CVE-2023-1079
A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.

CVE-2023-1079
A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.

CVE-2023-1079
A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.

CVE-2023-1079
CVE-2023-1079
A flaw was found in the Linux kernel. A use-after-free may be triggere ...

BDU:2023-01206
Уязвимость функции asus_kbd_backlight_set() (drivers/hid/hid-asus.c) драйвера ASUS USB клавиатуры ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2023:2830-1
Security update for the Linux Kernel

SUSE-SU-2023:2822-1
Security update for the Linux Kernel

SUSE-SU-2023:2808-1
Security update for the Linux Kernel

SUSE-SU-2023:2804-1
Security update for the Linux Kernel

SUSE-SU-2023:2651-1
Security update for the Linux Kernel

SUSE-SU-2023:2611-1
Security update for the Linux Kernel

SUSE-SU-2023:2653-1
Security update for the Linux Kernel

SUSE-SU-2023:2500-1
Security update for the Linux Kernel

SUSE-SU-2023:2782-1
Security update for the Linux Kernel
ELSA-2023-6583
ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)
ELSA-2023-7077
ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT)

SUSE-SU-2023:2646-1
Security update for the Linux Kernel

SUSE-SU-2023:2871-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-2679-jq7r-8cph A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data. | CVSS3: 6.8 | 0% Низкий | около 2 лет назад | |
![]() | CVE-2023-1079 A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data. | CVSS3: 6.8 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-1079 A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data. | CVSS3: 6.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-1079 A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data. | CVSS3: 6.8 | 0% Низкий | около 2 лет назад |
![]() | CVSS3: 6.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-1079 A flaw was found in the Linux kernel. A use-after-free may be triggere ... | CVSS3: 6.8 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-01206 Уязвимость функции asus_kbd_backlight_set() (drivers/hid/hid-asus.c) драйвера ASUS USB клавиатуры ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 6.8 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2023:2830-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2822-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2808-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2804-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2651-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2611-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2653-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2500-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | SUSE-SU-2023:2782-1 Security update for the Linux Kernel | почти 2 года назад | ||
ELSA-2023-6583 ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-7077 ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 1 года назад | |||
![]() | SUSE-SU-2023:2646-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2871-1 Security update for the Linux Kernel | почти 2 года назад |
Уязвимостей на страницу