Логотип exploitDog
bind:"GHSA-qggq-gw32-wcq3" OR bind:"CVE-2023-52626"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-qggq-gw32-wcq3" OR bind:"CVE-2023-52626"

Количество 11

Количество 11

github логотип

GHSA-qggq-gw32-wcq3

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.

CVSS3: 7.1
EPSS: Низкий
ubuntu логотип

CVE-2023-52626

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2023-52626

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2023-52626

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2023-52626

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 7.1
EPSS: Низкий
rocky логотип

RLSA-2024:4349

около 1 года назад

Moderate: kernel security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-4349

около 1 года назад

ELSA-2024-4349: kernel security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12682

11 месяцев назад

ELSA-2024-12682: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
redos логотип

ROS-20241004-04

10 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 8.8
EPSS: Низкий
rocky логотип

RLSA-2024:4211

около 1 года назад

Important: kernel security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-4211

около 1 года назад

ELSA-2024-4211: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-qggq-gw32-wcq3

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.

CVSS3: 7.1
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2023-52626

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.

CVSS3: 7.1
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-52626

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.

CVSS3: 6
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-52626

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.

CVSS3: 7.1
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-52626

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 7.1
0%
Низкий
больше 1 года назад
rocky логотип
RLSA-2024:4349

Moderate: kernel security and bug fix update

около 1 года назад
oracle-oval логотип
ELSA-2024-4349

ELSA-2024-4349: kernel security and bug fix update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-12682

ELSA-2024-12682: Unbreakable Enterprise kernel security update (IMPORTANT)

11 месяцев назад
redos логотип
ROS-20241004-04

Множественные уязвимости kernel-lt

CVSS3: 8.8
10 месяцев назад
rocky логотип
RLSA-2024:4211

Important: kernel security and bug fix update

около 1 года назад
oracle-oval логотип
ELSA-2024-4211

ELSA-2024-4211: kernel security and bug fix update (IMPORTANT)

около 1 года назад

Уязвимостей на страницу