Количество 38
Количество 38
ELSA-2023-12970
ELSA-2023-12970: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2023-4208
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVE-2023-4208
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVE-2023-4208
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

CVE-2023-4208
CVE-2023-4208
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u3 ...

CVE-2023-40283
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

CVE-2023-40283
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

CVE-2023-40283
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
CVE-2023-40283
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_s ...
GHSA-ph8p-rrmj-8gf2
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.

BDU:2023-05390
Уязвимость функции u32_init_knode() в модуле net/sched/cls_u32.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии
GHSA-cp56-rpr6-7673
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

BDU:2023-04770
Уязвимость функций l2cap_sock_release (net/bluetooth/l2cap_sock.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие.
ELSA-2023-7423
ELSA-2023-7423: kernel security update (IMPORTANT)

ROS-20241008-10
Множественные уязвимости kernel-lt

SUSE-SU-2023:4030-1
Security update for the Linux Kernel
ELSA-2024-12094
ELSA-2024-12094: kernel security update (IMPORTANT)

SUSE-SU-2023:4095-1
Security update for the Linux Kernel

SUSE-SU-2023:3705-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2023-12970 ELSA-2023-12970: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 1 года назад | |||
![]() | CVE-2023-4208 A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4208 A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4208 A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
CVE-2023-4208 A use-after-free vulnerability in the Linux kernel's net/sched: cls_u3 ... | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
![]() | CVE-2023-40283 An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-40283 An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-40283 An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
CVE-2023-40283 An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_s ... | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
GHSA-ph8p-rrmj-8gf2 A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-05390 Уязвимость функции u32_init_knode() в модуле net/sched/cls_u32.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
GHSA-cp56-rpr6-7673 An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-04770 Уязвимость функций l2cap_sock_release (net/bluetooth/l2cap_sock.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад |
ELSA-2023-7423 ELSA-2023-7423: kernel security update (IMPORTANT) | больше 1 года назад | |||
![]() | ROS-20241008-10 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 9 месяцев назад | |
![]() | SUSE-SU-2023:4030-1 Security update for the Linux Kernel | почти 2 года назад | ||
ELSA-2024-12094 ELSA-2024-12094: kernel security update (IMPORTANT) | больше 1 года назад | |||
![]() | SUSE-SU-2023:4095-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:3705-1 Security update for the Linux Kernel | почти 2 года назад |
Уязвимостей на страницу