Количество 20
Количество 20
CVE-2023-1076
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
CVE-2023-1076
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
CVE-2023-1076
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
CVE-2023-1076
A flaw was found in the Linux Kernel. The tun/tap sockets have their s ...
GHSA-f7qv-v8h9-5244
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
BDU:2023-01204
Уязвимость функции tap_open() (/drivers/net/tap.c) драйвера виртуального сетевого адаптера TAP ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
SUSE-SU-2023:1894-1
Security update for the Linux Kernel
SUSE-SU-2023:1803-1
Security update for the Linux Kernel
SUSE-SU-2023:1801-1
Security update for the Linux Kernel
SUSE-SU-2023:1848-1
Security update for the Linux Kernel
SUSE-SU-2023:1609-1
Security update for the Linux Kernel
SUSE-SU-2023:1710-1
Security update for the Linux Kernel
SUSE-SU-2023:1811-1
Security update for the Linux Kernel
SUSE-SU-2023:1800-1
Security update for the Linux Kernel
SUSE-SU-2023:1608-1
Security update for the Linux Kernel
SUSE-SU-2023:2232-1
Security update for the Linux Kernel
ELSA-2023-6583
ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)
SUSE-SU-2023:2646-1
Security update for the Linux Kernel
SUSE-SU-2023:2871-1
Security update for the Linux Kernel
SUSE-SU-2023:2809-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-1076 A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters. | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад | |
CVE-2023-1076 A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters. | CVSS3: 5.5 | 0% Низкий | почти 3 года назад | |
CVE-2023-1076 A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters. | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад | |
CVE-2023-1076 A flaw was found in the Linux Kernel. The tun/tap sockets have their s ... | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад | |
GHSA-f7qv-v8h9-5244 A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters. | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад | |
BDU:2023-01204 Уязвимость функции tap_open() (/drivers/net/tap.c) драйвера виртуального сетевого адаптера TAP ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 5.5 | 0% Низкий | почти 3 года назад | |
SUSE-SU-2023:1894-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:1803-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:1801-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:1848-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:1609-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:1710-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:1811-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:1800-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:1608-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:2232-1 Security update for the Linux Kernel | больше 2 лет назад | |||
ELSA-2023-6583 ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT) | около 2 лет назад | |||
SUSE-SU-2023:2646-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:2871-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:2809-1 Security update for the Linux Kernel | больше 2 лет назад |
Уязвимостей на страницу