Количество 17
Количество 17

BDU:2023-06203
Уязвимость подсистемы eBPF ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии

ROS-20241004-09
Множественные уязвимости kernel-lt

CVE-2023-39191
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

CVE-2023-39191
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

CVE-2023-39191
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
CVE-2023-39191
An improper input validation flaw was found in the eBPF subsystem in t ...
GHSA-gxg7-pxwf-9r28
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

SUSE-SU-2024:1045-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5)

SUSE-SU-2024:1023-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5)

SUSE-SU-2024:0995-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5)

SUSE-SU-2024:0986-1
Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5)

SUSE-SU-2024:1097-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)

SUSE-SU-2024:1039-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)

SUSE-SU-2023:4375-1
Security update for the Linux Kernel

SUSE-SU-2023:4343-1
Security update for the Linux Kernel

SUSE-SU-2023:4414-1
Security update for the Linux Kernel
ELSA-2023-6583
ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2023-06203 Уязвимость подсистемы eBPF ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 8.2 | 0% Низкий | больше 2 лет назад |
![]() | ROS-20241004-09 Множественные уязвимости kernel-lt | CVSS3: 8.2 | 9 месяцев назад | |
![]() | CVE-2023-39191 An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel. | CVSS3: 8.2 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-39191 An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel. | CVSS3: 8.2 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-39191 An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel. | CVSS3: 8.2 | 0% Низкий | больше 1 года назад |
CVE-2023-39191 An improper input validation flaw was found in the eBPF subsystem in t ... | CVSS3: 8.2 | 0% Низкий | больше 1 года назад | |
GHSA-gxg7-pxwf-9r28 An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel. | CVSS3: 8.2 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:1045-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1023-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:0995-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:0986-1 Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1097-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2024:1039-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) | около 1 года назад | ||
![]() | SUSE-SU-2023:4375-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4343-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4414-1 Security update for the Linux Kernel | больше 1 года назад | ||
ELSA-2023-6583 ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 1 года назад |
Уязвимостей на страницу