Количество 20
Количество 20

CVE-2023-1076
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.

CVE-2023-1076
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.

CVE-2023-1076
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
CVE-2023-1076
A flaw was found in the Linux Kernel. The tun/tap sockets have their s ...
GHSA-f7qv-v8h9-5244
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.

BDU:2023-01204
Уязвимость функции tap_open() (/drivers/net/tap.c) драйвера виртуального сетевого адаптера TAP ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

SUSE-SU-2023:1894-1
Security update for the Linux Kernel

SUSE-SU-2023:1803-1
Security update for the Linux Kernel

SUSE-SU-2023:1801-1
Security update for the Linux Kernel

SUSE-SU-2023:1848-1
Security update for the Linux Kernel

SUSE-SU-2023:1609-1
Security update for the Linux Kernel

SUSE-SU-2023:1710-1
Security update for the Linux Kernel

SUSE-SU-2023:1811-1
Security update for the Linux Kernel

SUSE-SU-2023:1800-1
Security update for the Linux Kernel

SUSE-SU-2023:1608-1
Security update for the Linux Kernel

SUSE-SU-2023:2232-1
Security update for the Linux Kernel
ELSA-2023-6583
ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT)

SUSE-SU-2023:2646-1
Security update for the Linux Kernel

SUSE-SU-2023:2871-1
Security update for the Linux Kernel

SUSE-SU-2023:2809-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-1076 A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-1076 A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters. | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-1076 A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад |
CVE-2023-1076 A flaw was found in the Linux Kernel. The tun/tap sockets have their s ... | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
GHSA-f7qv-v8h9-5244 A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-01204 Уязвимость функции tap_open() (/drivers/net/tap.c) драйвера виртуального сетевого адаптера TAP ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2023:1894-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | SUSE-SU-2023:1803-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | SUSE-SU-2023:1801-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | SUSE-SU-2023:1848-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:1609-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | SUSE-SU-2023:1710-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | SUSE-SU-2023:1811-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:1800-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:1608-1 Security update for the Linux Kernel | около 2 лет назад | ||
![]() | SUSE-SU-2023:2232-1 Security update for the Linux Kernel | почти 2 года назад | ||
ELSA-2023-6583 ELSA-2023-6583: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 1 года назад | |||
![]() | SUSE-SU-2023:2646-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2871-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:2809-1 Security update for the Linux Kernel | почти 2 года назад |
Уязвимостей на страницу