Количество 38
Количество 38
GHSA-222x-4qhm-7h5f
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVE-2023-0461
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVE-2023-0461
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVE-2023-0461
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVE-2023-0461
CVE-2023-0461
There is a use-after-free vulnerability in the Linux Kernel which can ...

BDU:2023-01200
Уязвимость реализации протокола Upper Level Protocol (ULP) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии, выполнить произвольный код или вызвать отказ в обслуживании

SUSE-SU-2024:1097-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)

SUSE-SU-2024:1039-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)

SUSE-SU-2023:2416-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3)

SUSE-SU-2023:4883-1
Security update for the Linux Kernel

SUSE-SU-2023:4882-1
Security update for the Linux Kernel

SUSE-SU-2023:4784-1
Security update for the Linux Kernel

SUSE-SU-2023:4735-1
Security update for the Linux Kernel

SUSE-SU-2023:2468-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)

SUSE-SU-2023:2455-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP4)

SUSE-SU-2023:2448-1
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP2)

SUSE-SU-2023:2443-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP4)

SUSE-SU-2023:2431-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4)

SUSE-SU-2023:2425-1
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP4)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-222x-4qhm-7h5f There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
![]() | CVE-2023-0461 There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-0461 There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-0461 There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
CVE-2023-0461 There is a use-after-free vulnerability in the Linux Kernel which can ... | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
![]() | BDU:2023-01200 Уязвимость реализации протокола Upper Level Protocol (ULP) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии, выполнить произвольный код или вызвать отказ в обслуживании | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2024:1097-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2024:1039-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:2416-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3) | около 2 лет назад | ||
![]() | SUSE-SU-2023:4883-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4882-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4784-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:4735-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:2468-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2455-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2448-1 Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP2) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2443-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2431-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4) | около 2 лет назад | ||
![]() | SUSE-SU-2023:2425-1 Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP4) | около 2 лет назад |
Уязвимостей на страницу