Количество 113
Количество 113
ELSA-2023-7749
ELSA-2023-7749: kernel security update (IMPORTANT)
ELSA-2023-13047
ELSA-2023-13047: kernel security update (IMPORTANT)
CVE-2023-5345
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.
CVE-2023-5345
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.
CVE-2023-5345
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.
CVE-2023-5345
Use-after-free in Linux kernel's fs/smb/client component
CVE-2023-5345
A use-after-free vulnerability in the Linux kernel's fs/smb/client com ...
GHSA-g488-m495-9mgj
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.
BDU:2023-06347
Уязвимость функции smb3_fs_context_parse_param() компонента fs/smb/client ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
SUSE-SU-2023:4071-1
Security update for the Linux Kernel
SUSE-SU-2023:4093-1
Security update for the Linux Kernel
SUSE-SU-2023:4072-2
Security update for the Linux Kernel
SUSE-SU-2023:4072-1
Security update for the Linux Kernel
SUSE-SU-2023:4058-1
Security update for the Linux Kernel
SUSE-SU-2023:4057-1
Security update for the Linux Kernel
CVE-2023-20569
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
CVE-2023-20569
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
CVE-2023-20569
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
CVE-2023-20569
AMD: CVE-2023-20569 Return Address Predictor
CVE-2023-20569
A side channel vulnerability on some of the AMD CPUs may allow an atta ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2023-7749 ELSA-2023-7749: kernel security update (IMPORTANT) | почти 2 года назад | |||
ELSA-2023-13047 ELSA-2023-13047: kernel security update (IMPORTANT) | почти 2 года назад | |||
CVE-2023-5345 A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-5345 A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-5345 A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-5345 Use-after-free in Linux kernel's fs/smb/client component | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-5345 A use-after-free vulnerability in the Linux kernel's fs/smb/client com ... | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
GHSA-g488-m495-9mgj A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
BDU:2023-06347 Уязвимость функции smb3_fs_context_parse_param() компонента fs/smb/client ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
SUSE-SU-2023:4071-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4093-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4072-2 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4072-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4058-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4057-1 Security update for the Linux Kernel | около 2 лет назад | |||
CVE-2023-20569 A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. | CVSS3: 4.7 | 1% Низкий | больше 2 лет назад | |
CVE-2023-20569 A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. | CVSS3: 5.6 | 1% Низкий | больше 2 лет назад | |
CVE-2023-20569 A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. | CVSS3: 4.7 | 1% Низкий | больше 2 лет назад | |
CVE-2023-20569 AMD: CVE-2023-20569 Return Address Predictor | 1% Низкий | больше 2 лет назад | ||
CVE-2023-20569 A side channel vulnerability on some of the AMD CPUs may allow an atta ... | CVSS3: 4.7 | 1% Низкий | больше 2 лет назад |
Уязвимостей на страницу