Количество 34
Количество 34
CVE-2023-1390
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
CVE-2023-1390
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
CVE-2023-1390
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
CVE-2023-1390
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100% causing a denial of service condition.
CVE-2023-1390
A remote denial of service vulnerability was found in the Linux kernel ...
GHSA-875q-9h9j-qhmh
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
BDU:2023-01284
Уязвимость реализации протокола TIPC (Transparent Inter Process Communication) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2023:2690-1
Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP4)
SUSE-SU-2023:2666-1
Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP4)
SUSE-SU-2023:2719-1
Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5)
SUSE-SU-2023:2708-1
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP4)
SUSE-SU-2023:2689-1
Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP5)
SUSE-SU-2023:2681-1
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP1)
SUSE-SU-2023:2660-1
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP4)
SUSE-SU-2023:2724-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3)
SUSE-SU-2023:2718-1
Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP5)
SUSE-SU-2023:2702-1
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP1)
SUSE-SU-2023:2701-1
Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP3)
SUSE-SU-2023:2698-1
Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP2)
SUSE-SU-2023:2686-1
Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-1390 A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition. | CVSS3: 7.5 | 1% Низкий | почти 3 года назад | |
CVE-2023-1390 A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition. | CVSS3: 7.5 | 1% Низкий | около 5 лет назад | |
CVE-2023-1390 A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition. | CVSS3: 7.5 | 1% Низкий | почти 3 года назад | |
CVE-2023-1390 A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100% causing a denial of service condition. | CVSS3: 7.5 | 1% Низкий | почти 3 года назад | |
CVE-2023-1390 A remote denial of service vulnerability was found in the Linux kernel ... | CVSS3: 7.5 | 1% Низкий | почти 3 года назад | |
GHSA-875q-9h9j-qhmh A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition. | CVSS3: 7.5 | 1% Низкий | больше 2 лет назад | |
BDU:2023-01284 Уязвимость реализации протокола TIPC (Transparent Inter Process Communication) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | около 5 лет назад | |
SUSE-SU-2023:2690-1 Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP4) | больше 2 лет назад | |||
SUSE-SU-2023:2666-1 Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP4) | больше 2 лет назад | |||
SUSE-SU-2023:2719-1 Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5) | больше 2 лет назад | |||
SUSE-SU-2023:2708-1 Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP4) | больше 2 лет назад | |||
SUSE-SU-2023:2689-1 Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP5) | больше 2 лет назад | |||
SUSE-SU-2023:2681-1 Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP1) | больше 2 лет назад | |||
SUSE-SU-2023:2660-1 Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP4) | больше 2 лет назад | |||
SUSE-SU-2023:2724-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3) | больше 2 лет назад | |||
SUSE-SU-2023:2718-1 Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP5) | больше 2 лет назад | |||
SUSE-SU-2023:2702-1 Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP1) | больше 2 лет назад | |||
SUSE-SU-2023:2701-1 Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP3) | больше 2 лет назад | |||
SUSE-SU-2023:2698-1 Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP2) | больше 2 лет назад | |||
SUSE-SU-2023:2686-1 Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP5) | больше 2 лет назад |
Уязвимостей на страницу