Количество 39
Количество 39

CVE-2023-4921
A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.

CVE-2023-4921
A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.

CVE-2023-4921
A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.
CVE-2023-4921
A use-after-free vulnerability in the Linux kernel's net/sched: sch_qf ...
GHSA-qw4m-2pv2-7r5f
A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.

BDU:2023-05783
Уязвимость функции qfq_dequeue() в модуле net/sched/sch_plug.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии

SUSE-SU-2024:0685-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5)

SUSE-SU-2024:0624-1
Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5)

SUSE-SU-2024:0727-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5)

SUSE-SU-2024:0698-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5)

SUSE-SU-2024:0666-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP4)

SUSE-SU-2024:0655-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)

SUSE-SU-2024:0622-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5)
ELSA-2024-1831
ELSA-2024-1831: kernel security update (IMPORTANT)
ELSA-2024-12110
ELSA-2024-12110: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2024-1249
ELSA-2024-1249: kernel security and bug fix update (IMPORTANT)
ELSA-2023-13043
ELSA-2023-13043: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2023:4035-1
Security update for the Linux Kernel

SUSE-SU-2023:4033-1
Security update for the Linux Kernel

SUSE-SU-2023:4032-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-4921 A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4921 A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4921 A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
CVE-2023-4921 A use-after-free vulnerability in the Linux kernel's net/sched: sch_qf ... | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
GHSA-qw4m-2pv2-7r5f A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-05783 Уязвимость функции qfq_dequeue() в модуле net/sched/sch_plug.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | SUSE-SU-2024:0685-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2024:0624-1 Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2024:0727-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2024:0698-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2024:0666-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP4) | больше 1 года назад | ||
![]() | SUSE-SU-2024:0655-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2024:0622-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) | больше 1 года назад | ||
ELSA-2024-1831 ELSA-2024-1831: kernel security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-12110 ELSA-2024-12110: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-1249 ELSA-2024-1249: kernel security and bug fix update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-13043 ELSA-2023-13043: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 1 года назад | |||
![]() | SUSE-SU-2023:4035-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4033-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4032-1 Security update for the Linux Kernel | больше 1 года назад |
Уязвимостей на страницу