Логотип exploitDog
bind:"GHSA-qg8q-9c83-3485" OR bind:"CVE-2022-48742"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-qg8q-9c83-3485" OR bind:"CVE-2022-48742"

Количество 10

Количество 10

github логотип

GHSA-qg8q-9c83-3485

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2022-48742

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2022-48742

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2022-48742

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2022-48742

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: r ...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2024-08348

больше 3 лет назад

Уязвимость функции __rtnl_newlink() (net/core/rtnetlink.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
redos логотип

ROS-20240822-01

12 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0236-1

6 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0201-2

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0201-1

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-qg8q-9c83-3485

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.

CVSS3: 7.8
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2022-48742

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.

CVSS3: 7.8
0%
Низкий
около 1 года назад
redhat логотип
CVE-2022-48742

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.

CVSS3: 6.4
0%
Низкий
около 1 года назад
nvd логотип
CVE-2022-48742

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.

CVSS3: 7.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2022-48742

In the Linux kernel, the following vulnerability has been resolved: r ...

CVSS3: 7.8
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-08348

Уязвимость функции __rtnl_newlink() (net/core/rtnetlink.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
redos логотип
ROS-20240822-01

Множественные уязвимости kernel-lt

CVSS3: 7.8
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0236-1

Security update for the Linux Kernel

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0201-2

Security update for the Linux Kernel

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0201-1

Security update for the Linux Kernel

5 месяцев назад

Уязвимостей на страницу