Количество 49
Количество 49

CVE-2023-3776
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.

CVE-2023-3776
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.

CVE-2023-3776
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.

CVE-2023-3776
CVE-2023-3776
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw ...
GHSA-fcg7-9x44-gx43
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.

BDU:2023-04270
Уязвимость функции fw_set_parms() в модуле net/sched/cls_fw.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации и повысить свои привилегии

SUSE-SU-2023:3924-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5)

SUSE-SU-2023:3923-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5)

SUSE-SU-2023:3838-1
Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP1)

SUSE-SU-2023:3809-1
Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP1)

SUSE-SU-2023:3786-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP1)

SUSE-SU-2023:3773-1
Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP4)

SUSE-SU-2023:3768-1
Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1)

SUSE-SU-2023:3749-1
Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP5)
ELSA-2024-1831
ELSA-2024-1831: kernel security update (IMPORTANT)

SUSE-SU-2023:3922-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP4)

SUSE-SU-2023:3893-1
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP2)

SUSE-SU-2023:3889-1
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP2)

SUSE-SU-2023:3846-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-3776 A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-3776 A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f. | CVSS3: 7 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-3776 A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
CVE-2023-3776 A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw ... | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
GHSA-fcg7-9x44-gx43 A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-04270 Уязвимость функции fw_set_parms() в модуле net/sched/cls_fw.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации и повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | SUSE-SU-2023:3924-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3923-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3838-1 Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP1) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3809-1 Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP1) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3786-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP1) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3773-1 Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP4) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3768-1 Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3749-1 Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP5) | больше 1 года назад | ||
ELSA-2024-1831 ELSA-2024-1831: kernel security update (IMPORTANT) | около 1 года назад | |||
![]() | SUSE-SU-2023:3922-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP4) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3893-1 Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP2) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3889-1 Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP2) | больше 1 года назад | ||
![]() | SUSE-SU-2023:3846-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2) | больше 1 года назад |
Уязвимостей на страницу