Логотип exploitDog
bind:"GHSA-h5cm-gwjx-3qq9" OR bind:"CVE-2023-21102"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-h5cm-gwjx-3qq9" OR bind:"CVE-2023-21102"

Количество 14

Количество 14

github логотип

GHSA-h5cm-gwjx-3qq9

около 2 лет назад

In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2023-21102

около 2 лет назад

In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-21102

больше 2 лет назад

In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-21102

около 2 лет назад

In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-21102

около 2 лет назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-21102

около 2 лет назад

In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypas ...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-02530

больше 2 лет назад

Уязвимость функций arch_efi_call_virt_setup() и arch_efi_call_virt_teardown() в модуле arch/arm64/include/asm/efi.h подсистемы Extensible Firmware Interface (EFI) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-5069

почти 2 года назад

ELSA-2023-5069: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2831-1

почти 2 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2820-1

почти 2 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2782-1

почти 2 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2646-1

почти 2 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2871-1

почти 2 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2809-1

почти 2 года назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-h5cm-gwjx-3qq9

In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

CVSS3: 7.8
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-21102

In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

CVSS3: 7.8
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-21102

In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-21102

In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel

CVSS3: 7.8
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 7.8
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-21102

In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypas ...

CVSS3: 7.8
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-02530

Уязвимость функций arch_efi_call_virt_setup() и arch_efi_call_virt_teardown() в модуле arch/arm64/include/asm/efi.h подсистемы Extensible Firmware Interface (EFI) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
oracle-oval логотип
ELSA-2023-5069

ELSA-2023-5069: kernel security, bug fix, and enhancement update (IMPORTANT)

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2831-1

Security update for the Linux Kernel

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2820-1

Security update for the Linux Kernel

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2782-1

Security update for the Linux Kernel

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2646-1

Security update for the Linux Kernel

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2871-1

Security update for the Linux Kernel

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2809-1

Security update for the Linux Kernel

почти 2 года назад

Уязвимостей на страницу