Количество 158
Количество 158

SUSE-SU-2023:0488-1
Security update for the Linux-RT Kernel

SUSE-SU-2024:0112-1
Security update for the Linux Kernel

SUSE-SU-2023:0780-1
Security update for the Linux Kernel

SUSE-SU-2023:4325-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5)

SUSE-SU-2023:4301-1
Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP4)

SUSE-SU-2023:4279-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2)

SUSE-SU-2023:4245-1
Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP2)

SUSE-SU-2023:4243-1
Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP2)

SUSE-SU-2023:4165-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5)
ELSA-2024-12149
ELSA-2024-12149: kernel security update (IMPORTANT)

CVE-2023-1206
A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.

CVE-2023-1206
A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.

CVE-2023-1206
A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
CVE-2023-1206
A hash collision flaw was found in the IPv6 connection lookup table in ...

SUSE-SU-2023:2506-1
Security update for the Linux Kernel

SUSE-SU-2023:1803-1
Security update for the Linux Kernel

SUSE-SU-2023:1801-1
Security update for the Linux Kernel

CVE-2023-6932
A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

CVE-2023-6932
A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

CVE-2023-6932
A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2023:0488-1 Security update for the Linux-RT Kernel | больше 2 лет назад | ||
![]() | SUSE-SU-2024:0112-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:0780-1 Security update for the Linux Kernel | больше 2 лет назад | ||
![]() | SUSE-SU-2023:4325-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4301-1 Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP4) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4279-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4245-1 Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP2) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4243-1 Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP2) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4165-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) | больше 1 года назад | ||
ELSA-2024-12149 ELSA-2024-12149: kernel security update (IMPORTANT) | больше 1 года назад | |||
![]() | CVE-2023-1206 A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%. | CVSS3: 5.7 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-1206 A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%. | CVSS3: 5.7 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-1206 A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%. | CVSS3: 5.7 | 0% Низкий | почти 2 года назад |
CVE-2023-1206 A hash collision flaw was found in the IPv6 connection lookup table in ... | CVSS3: 5.7 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:2506-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | SUSE-SU-2023:1803-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | SUSE-SU-2023:1801-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | CVE-2023-6932 A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6932 A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1. | CVSS3: 7 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6932 A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу