Количество 112
Количество 112
ELSA-2023-7749
ELSA-2023-7749: kernel security update (IMPORTANT)
ELSA-2023-13047
ELSA-2023-13047: kernel security update (IMPORTANT)

CVE-2023-5345
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.

CVE-2023-5345
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.

CVE-2023-5345
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.

CVE-2023-5345
CVE-2023-5345
A use-after-free vulnerability in the Linux kernel's fs/smb/client com ...
GHSA-g488-m495-9mgj
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.

BDU:2023-06347
Уязвимость функции smb3_fs_context_parse_param() компонента fs/smb/client ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

SUSE-SU-2023:4071-1
Security update for the Linux Kernel

SUSE-SU-2023:4093-1
Security update for the Linux Kernel

SUSE-SU-2023:4072-2
Security update for the Linux Kernel

SUSE-SU-2023:4072-1
Security update for the Linux Kernel

SUSE-SU-2023:4058-1
Security update for the Linux Kernel

SUSE-SU-2023:4057-1
Security update for the Linux Kernel

CVE-2023-20569
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

CVE-2023-20569
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

CVE-2023-20569
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

CVE-2023-20569
AMD: CVE-2023-20569 Return Address Predictor
CVE-2023-20569
A side channel vulnerability on some of the AMD CPUs may allow an atta ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2023-7749 ELSA-2023-7749: kernel security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-13047 ELSA-2023-13047: kernel security update (IMPORTANT) | больше 1 года назад | |||
![]() | CVE-2023-5345 A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-5345 A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-5345 A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
CVE-2023-5345 A use-after-free vulnerability in the Linux kernel's fs/smb/client com ... | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
GHSA-g488-m495-9mgj A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2023-06347 Уязвимость функции smb3_fs_context_parse_param() компонента fs/smb/client ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | больше 1 года назад |
![]() | SUSE-SU-2023:4071-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4093-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4072-2 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4072-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4058-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4057-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | CVE-2023-20569 A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. | CVSS3: 4.7 | 1% Низкий | почти 2 года назад |
![]() | CVE-2023-20569 A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. | CVSS3: 5.6 | 1% Низкий | почти 2 года назад |
![]() | CVE-2023-20569 A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. | CVSS3: 4.7 | 1% Низкий | почти 2 года назад |
![]() | CVE-2023-20569 AMD: CVE-2023-20569 Return Address Predictor | 1% Низкий | почти 2 года назад | |
CVE-2023-20569 A side channel vulnerability on some of the AMD CPUs may allow an atta ... | CVSS3: 4.7 | 1% Низкий | почти 2 года назад |
Уязвимостей на страницу