Логотип exploitDog
bind:"CVE-2023-39192" OR bind:"CVE-2023-45862" OR bind:"CVE-2023-4207" OR bind:"CVE-2023-39193"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-39192" OR bind:"CVE-2023-45862" OR bind:"CVE-2023-4207" OR bind:"CVE-2023-39193"

Количество 57

Количество 57

suse-cvrf логотип

SUSE-SU-2023:4058-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4057-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2023-45862

больше 1 года назад

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2023-45862

больше 2 лет назад

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2023-45862

больше 1 года назад

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2023-45862

больше 1 года назад

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the EN ...

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4345-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4343-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4414-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
github логотип

GHSA-85cj-83mp-x2mm

больше 1 года назад

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-06997

больше 2 лет назад

Уязвимость функции ms_lib_process_bootblock() в модуле drivers/usb/storage/ene_ub6250.c драйвера ene_usb6250 кард-ридера ENE SD/MS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.

CVSS3: 5.5
EPSS: Низкий
rocky логотип

RLSA-2024:3138

около 1 года назад

Moderate: kernel security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-3138

около 1 года назад

ELSA-2024-3138: kernel security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2023-4207

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-4207

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-4207

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-4207

почти 2 года назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-4207

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2023-39193

больше 1 года назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2023-39193

больше 1 года назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2023:4058-1

Security update for the Linux Kernel

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4057-1

Security update for the Linux Kernel

больше 1 года назад
ubuntu логотип
CVE-2023-45862

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-45862

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

CVSS3: 5.5
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-45862

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-45862

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the EN ...

CVSS3: 5.5
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4345-1

Security update for the Linux Kernel

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4343-1

Security update for the Linux Kernel

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4414-1

Security update for the Linux Kernel

больше 1 года назад
github логотип
GHSA-85cj-83mp-x2mm

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2023-06997

Уязвимость функции ms_lib_process_bootblock() в модуле drivers/usb/storage/ene_ub6250.c драйвера ene_usb6250 кард-ридера ENE SD/MS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.

CVSS3: 5.5
0%
Низкий
больше 2 лет назад
rocky логотип
RLSA-2024:3138

Moderate: kernel security, bug fix, and enhancement update

около 1 года назад
oracle-oval логотип
ELSA-2024-3138

ELSA-2024-3138: kernel security, bug fix, and enhancement update (MODERATE)

около 1 года назад
ubuntu логотип
CVE-2023-4207

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-4207

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-4207

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
msrc логотип
CVSS3: 7.8
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-4207

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw ...

CVSS3: 7.8
0%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2023-39193

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-39193

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVSS3: 6.1
0%
Низкий
больше 1 года назад

Уязвимостей на страницу