Количество 26
Количество 26
CVE-2023-1078
A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.
CVE-2023-1078
A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.
CVE-2023-1078
A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.
CVE-2023-1078
A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets ...
SUSE-SU-2023:1645-1
Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP3)
SUSE-SU-2023:1610-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2)
GHSA-r26p-gh73-qgq9
A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.
BDU:2023-01205
Уязвимость функции rds_rm_zerocopy_callback() в модуле net/rds/message.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2023:1651-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP3)
SUSE-SU-2023:1621-1
Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP4)
SUSE-SU-2023:1605-1
Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP2)
SUSE-SU-2023:1574-1
Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP4)
SUSE-SU-2023:1708-1
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP4)
SUSE-SU-2023:1649-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP4)
SUSE-SU-2023:1647-1
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP4)
SUSE-SU-2023:1639-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP4)
SUSE-SU-2023:1595-1
Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3)
SUSE-SU-2023:1592-1
Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP2)
SUSE-SU-2023:1591-1
Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP3)
SUSE-SU-2023:1576-1
Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP4)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-1078 A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption. | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
CVE-2023-1078 A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
CVE-2023-1078 A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption. | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
CVE-2023-1078 A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets ... | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
SUSE-SU-2023:1645-1 Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP3) | 0% Низкий | почти 3 года назад | ||
SUSE-SU-2023:1610-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2) | 0% Низкий | почти 3 года назад | ||
GHSA-r26p-gh73-qgq9 A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption. | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
BDU:2023-01205 Уязвимость функции rds_rm_zerocopy_callback() в модуле net/rds/message.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
SUSE-SU-2023:1651-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP3) | почти 3 года назад | |||
SUSE-SU-2023:1621-1 Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP4) | почти 3 года назад | |||
SUSE-SU-2023:1605-1 Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP2) | почти 3 года назад | |||
SUSE-SU-2023:1574-1 Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP4) | почти 3 года назад | |||
SUSE-SU-2023:1708-1 Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP4) | почти 3 года назад | |||
SUSE-SU-2023:1649-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP4) | почти 3 года назад | |||
SUSE-SU-2023:1647-1 Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP4) | почти 3 года назад | |||
SUSE-SU-2023:1639-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP4) | почти 3 года назад | |||
SUSE-SU-2023:1595-1 Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3) | почти 3 года назад | |||
SUSE-SU-2023:1592-1 Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP2) | почти 3 года назад | |||
SUSE-SU-2023:1591-1 Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP3) | почти 3 года назад | |||
SUSE-SU-2023:1576-1 Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP4) | почти 3 года назад |
Уязвимостей на страницу