Количество 60
Количество 60
CVE-2023-39193
A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
CVE-2023-39193
A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
CVE-2023-39193
A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
CVE-2023-39193
Kernel: netfilter: xtables sctp out-of-bounds read in match_flags()
CVE-2023-39193
A flaw was found in the Netfilter subsystem in the Linux kernel. The s ...
SUSE-SU-2023:4359-1
Security update for the Linux Kernel
SUSE-SU-2023:4349-1
Security update for the Linux Kernel
SUSE-SU-2023:4346-1
Security update for the Linux Kernel
GHSA-4fhg-56x9-rf4r
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.
BDU:2023-05369
Уязвимость компонента net/sched: cls_fw ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии
SUSE-SU-2023:4351-1
Security update for the Linux Kernel
GHSA-mpcv-wcv8-6rxw
A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
BDU:2023-06340
Уязвимость функции match_flags подсистемы Netfilter ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
ELSA-2023-7423
ELSA-2023-7423: kernel security update (IMPORTANT)
SUSE-SU-2023:4378-1
Security update for the Linux Kernel
SUSE-SU-2023:4375-1
Security update for the Linux Kernel
ROS-20241008-10
Множественные уязвимости kernel-lt
ELSA-2023-6583
ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)
ELSA-2023-7077
ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT)
ELSA-2024-2394
ELSA-2024-2394: kernel security, bug fix, and enhancement update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-39193 A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. | CVSS3: 6.1 | 0% Низкий | около 2 лет назад | |
CVE-2023-39193 A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. | CVSS3: 6.1 | 0% Низкий | около 2 лет назад | |
CVE-2023-39193 A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. | CVSS3: 6.1 | 0% Низкий | около 2 лет назад | |
CVE-2023-39193 Kernel: netfilter: xtables sctp out-of-bounds read in match_flags() | CVSS3: 6 | 0% Низкий | около 2 лет назад | |
CVE-2023-39193 A flaw was found in the Netfilter subsystem in the Linux kernel. The s ... | CVSS3: 6.1 | 0% Низкий | около 2 лет назад | |
SUSE-SU-2023:4359-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4349-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4346-1 Security update for the Linux Kernel | около 2 лет назад | |||
GHSA-4fhg-56x9-rf4r A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
BDU:2023-05369 Уязвимость компонента net/sched: cls_fw ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
SUSE-SU-2023:4351-1 Security update for the Linux Kernel | около 2 лет назад | |||
GHSA-mpcv-wcv8-6rxw A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. | CVSS3: 5.1 | 0% Низкий | около 2 лет назад | |
BDU:2023-06340 Уязвимость функции match_flags подсистемы Netfilter ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании | CVSS3: 6 | 0% Низкий | около 2 лет назад | |
ELSA-2023-7423 ELSA-2023-7423: kernel security update (IMPORTANT) | почти 2 года назад | |||
SUSE-SU-2023:4378-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4375-1 Security update for the Linux Kernel | около 2 лет назад | |||
ROS-20241008-10 Множественные уязвимости kernel-lt | CVSS3: 7.8 | около 1 года назад | ||
ELSA-2023-6583 ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-7077 ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT) | почти 2 года назад | |||
ELSA-2024-2394 ELSA-2024-2394: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 1 года назад |
Уязвимостей на страницу