Количество 44
Количество 44

CVE-2023-3609
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.

CVE-2023-3609
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.

CVE-2023-3609
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.

CVE-2023-3609
CVE-2023-3609
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u3 ...
GHSA-2qmp-8j6q-mcq6
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.

BDU:2023-03960
Уязвимость функции u32_set_parms() в модуле net/sched/cls_u32.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных

SUSE-SU-2023:3924-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5)
ELSA-2023-5622
ELSA-2023-5622: kernel security and bug fix update (IMPORTANT)

SUSE-SU-2023:3923-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5)

SUSE-SU-2023:3838-1
Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP1)

SUSE-SU-2023:3809-1
Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP1)

SUSE-SU-2023:3786-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP1)

SUSE-SU-2023:3773-1
Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP4)

SUSE-SU-2023:3768-1
Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1)

SUSE-SU-2023:3749-1
Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP5)

SUSE-SU-2023:3922-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP4)

SUSE-SU-2023:3893-1
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP2)

SUSE-SU-2023:3889-1
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP2)

SUSE-SU-2023:3846-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-3609 A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-3609 A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc. | CVSS3: 7 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-3609 A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
CVE-2023-3609 A use-after-free vulnerability in the Linux kernel's net/sched: cls_u3 ... | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
GHSA-2qmp-8j6q-mcq6 A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-03960 Уязвимость функции u32_set_parms() в модуле net/sched/cls_u32.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных | CVSS3: 7.8 | 0% Низкий | около 2 лет назад |
![]() | SUSE-SU-2023:3924-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5) | больше 1 года назад | ||
ELSA-2023-5622 ELSA-2023-5622: kernel security and bug fix update (IMPORTANT) | больше 1 года назад | |||
![]() | SUSE-SU-2023:3923-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3838-1 Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP1) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3809-1 Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP1) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3786-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP1) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3773-1 Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP4) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3768-1 Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3749-1 Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3922-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP4) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3893-1 Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP2) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3889-1 Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP2) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3846-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2) | больше 1 года назад |
Уязвимостей на страницу