Логотип exploitDog
bind:"GHSA-222x-4qhm-7h5f" OR bind:"CVE-2023-0461"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-222x-4qhm-7h5f" OR bind:"CVE-2023-0461"

Количество 38

Количество 38

github логотип

GHSA-222x-4qhm-7h5f

больше 2 лет назад

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2023-0461

больше 2 лет назад

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-0461

больше 2 лет назад

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-0461

больше 2 лет назад

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-0461

больше 2 лет назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-0461

больше 2 лет назад

There is a use-after-free vulnerability in the Linux Kernel which can ...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-01200

больше 2 лет назад

Уязвимость реализации протокола Upper Level Protocol (ULP) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии, выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1097-1

больше 1 года назад

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1039-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2416-1

около 2 лет назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4883-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4882-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4784-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4735-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2468-1

около 2 лет назад

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2455-1

около 2 лет назад

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2448-1

около 2 лет назад

Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2443-1

около 2 лет назад

Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2431-1

около 2 лет назад

Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2425-1

около 2 лет назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP4)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-222x-4qhm-7h5f

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2023-0461

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-0461

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-0461

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 7.8
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-0461

There is a use-after-free vulnerability in the Linux Kernel which can ...

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-01200

Уязвимость реализации протокола Upper Level Protocol (ULP) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии, выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:1097-1

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1039-1

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:2416-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3)

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4883-1

Security update for the Linux Kernel

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4882-1

Security update for the Linux Kernel

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4784-1

Security update for the Linux Kernel

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4735-1

Security update for the Linux Kernel

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:2468-1

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2455-1

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP4)

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2448-1

Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP2)

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2443-1

Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP4)

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2431-1

Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4)

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2425-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP4)

около 2 лет назад

Уязвимостей на страницу