Логотип exploitDog
bind:"CVE-2023-40283" OR bind:"CVE-2023-4208"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-40283" OR bind:"CVE-2023-4208"

Количество 38

Количество 38

oracle-oval логотип

ELSA-2023-12970

больше 1 года назад

ELSA-2023-12970: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2023-4208

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-4208

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-4208

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-4208

почти 2 года назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-4208

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u3 ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2023-40283

почти 2 года назад

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-40283

почти 2 года назад

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-40283

почти 2 года назад

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-40283

почти 2 года назад

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_s ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-ph8p-rrmj-8gf2

почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-05390

почти 2 года назад

Уязвимость функции u32_init_knode() в модуле net/sched/cls_u32.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-cp56-rpr6-7673

почти 2 года назад

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-04770

около 2 лет назад

Уязвимость функций l2cap_sock_release (net/bluetooth/l2cap_sock.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие.

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-7423

больше 1 года назад

ELSA-2023-7423: kernel security update (IMPORTANT)

EPSS: Низкий
redos логотип

ROS-20241008-10

9 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4030-1

почти 2 года назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12094

больше 1 года назад

ELSA-2024-12094: kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4095-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3705-1

почти 2 года назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2023-12970

ELSA-2023-12970: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 1 года назад
ubuntu логотип
CVE-2023-4208

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-4208

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-4208

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
msrc логотип
CVSS3: 7.8
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-4208

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u3 ...

CVSS3: 7.8
0%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2023-40283

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-40283

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-40283

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-40283

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_s ...

CVSS3: 7.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-ph8p-rrmj-8gf2

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-05390

Уязвимость функции u32_init_knode() в модуле net/sched/cls_u32.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии

CVSS3: 7.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-cp56-rpr6-7673

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-04770

Уязвимость функций l2cap_sock_release (net/bluetooth/l2cap_sock.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие.

CVSS3: 7.8
0%
Низкий
около 2 лет назад
oracle-oval логотип
ELSA-2023-7423

ELSA-2023-7423: kernel security update (IMPORTANT)

больше 1 года назад
redos логотип
ROS-20241008-10

Множественные уязвимости kernel-lt

CVSS3: 7.8
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2023:4030-1

Security update for the Linux Kernel

почти 2 года назад
oracle-oval логотип
ELSA-2024-12094

ELSA-2024-12094: kernel security update (IMPORTANT)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4095-1

Security update for the Linux Kernel

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3705-1

Security update for the Linux Kernel

почти 2 года назад

Уязвимостей на страницу