Количество 18
Количество 18
GHSA-gxg7-pxwf-9r28
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
CVE-2023-39191
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
CVE-2023-39191
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
CVE-2023-39191
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
CVE-2023-39191
Kernel: ebpf: insufficient stack type checks in dynptr
CVE-2023-39191
An improper input validation flaw was found in the eBPF subsystem in t ...
BDU:2023-06203
Уязвимость подсистемы eBPF ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии
SUSE-SU-2024:1045-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5)
SUSE-SU-2024:1023-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5)
SUSE-SU-2024:0995-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5)
SUSE-SU-2024:0986-1
Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5)
SUSE-SU-2024:1097-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)
SUSE-SU-2024:1039-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)
ROS-20241004-09
Множественные уязвимости kernel-lt
SUSE-SU-2023:4375-1
Security update for the Linux Kernel
SUSE-SU-2023:4343-1
Security update for the Linux Kernel
SUSE-SU-2023:4414-1
Security update for the Linux Kernel
ELSA-2023-6583
ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-gxg7-pxwf-9r28 An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel. | CVSS3: 8.2 | 0% Низкий | около 2 лет назад | |
CVE-2023-39191 An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel. | CVSS3: 8.2 | 0% Низкий | около 2 лет назад | |
CVE-2023-39191 An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel. | CVSS3: 8.2 | 0% Низкий | около 2 лет назад | |
CVE-2023-39191 An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel. | CVSS3: 8.2 | 0% Низкий | около 2 лет назад | |
CVE-2023-39191 Kernel: ebpf: insufficient stack type checks in dynptr | CVSS3: 8.2 | 0% Низкий | около 2 лет назад | |
CVE-2023-39191 An improper input validation flaw was found in the eBPF subsystem in t ... | CVSS3: 8.2 | 0% Низкий | около 2 лет назад | |
BDU:2023-06203 Уязвимость подсистемы eBPF ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 8.2 | 0% Низкий | почти 3 года назад | |
SUSE-SU-2024:1045-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) | больше 1 года назад | |||
SUSE-SU-2024:1023-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5) | больше 1 года назад | |||
SUSE-SU-2024:0995-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5) | больше 1 года назад | |||
SUSE-SU-2024:0986-1 Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) | больше 1 года назад | |||
SUSE-SU-2024:1097-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) | больше 1 года назад | |||
SUSE-SU-2024:1039-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) | больше 1 года назад | |||
ROS-20241004-09 Множественные уязвимости kernel-lt | CVSS3: 8.2 | около 1 года назад | ||
SUSE-SU-2023:4375-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4343-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4414-1 Security update for the Linux Kernel | около 2 лет назад | |||
ELSA-2023-6583 ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT) | около 2 лет назад |
Уязвимостей на страницу