Количество 31
Количество 31
GHSA-pvw8-76h2-7q32
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url

CVE-2022-42896
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url

CVE-2022-42896
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url

CVE-2022-42896
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url
CVE-2022-42896
There are use-after-free vulnerabilities in the Linux kernel's net/blu ...

BDU:2022-07074
Уязвимость функций l2cap_connect и l2cap_le_connect_req (net/bluetooth/l2cap_core.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код
ELSA-2023-12121
ELSA-2023-12121: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2023-12119
ELSA-2023-12119: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2023-12018
ELSA-2023-12018: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2023-12017
ELSA-2023-12017: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2023-12118
ELSA-2023-12118: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2023-12117
ELSA-2023-12117: Unbreakable Enterprise kernel security update (IMPORTANT)

RLSA-2023:4517
Important: kernel security and bug fix update
ELSA-2024-1249
ELSA-2024-1249: kernel security and bug fix update (IMPORTANT)
ELSA-2023-4517
ELSA-2023-4517: kernel security and bug fix update (IMPORTANT)
ELSA-2023-12109
ELSA-2023-12109: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2023:0420-1
Security update for the Linux Kernel

SUSE-SU-2022:4566-1
Security update for the Linux Kernel

SUSE-SU-2022:4505-1
Security update for the Linux Kernel

SUSE-SU-2022:4613-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-pvw8-76h2-7q32 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад | |
![]() | CVE-2022-42896 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url | CVSS3: 8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-42896 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url | CVSS3: 8.1 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-42896 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url | CVSS3: 8 | 0% Низкий | больше 2 лет назад |
CVE-2022-42896 There are use-after-free vulnerabilities in the Linux kernel's net/blu ... | CVSS3: 8 | 0% Низкий | больше 2 лет назад | |
![]() | BDU:2022-07074 Уязвимость функций l2cap_connect и l2cap_le_connect_req (net/bluetooth/l2cap_core.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад |
ELSA-2023-12121 ELSA-2023-12121: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2023-12119 ELSA-2023-12119: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2023-12018 ELSA-2023-12018: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2023-12017 ELSA-2023-12017: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2023-12118 ELSA-2023-12118: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2023-12117 ELSA-2023-12117: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 2 лет назад | |||
![]() | RLSA-2023:4517 Important: kernel security and bug fix update | больше 1 года назад | ||
ELSA-2024-1249 ELSA-2024-1249: kernel security and bug fix update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-4517 ELSA-2023-4517: kernel security and bug fix update (IMPORTANT) | почти 2 года назад | |||
ELSA-2023-12109 ELSA-2023-12109: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 2 лет назад | |||
![]() | SUSE-SU-2023:0420-1 Security update for the Linux Kernel | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4566-1 Security update for the Linux Kernel | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4505-1 Security update for the Linux Kernel | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4613-1 Security update for the Linux Kernel | больше 2 лет назад |
Уязвимостей на страницу