Количество 14
Количество 14
CVE-2023-1872
A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.
CVE-2023-1872
A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.
CVE-2023-1872
A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.
CVE-2023-1872
CVE-2023-1872
A use-after-free vulnerability in the Linux Kernel io_uring system can ...
GHSA-jhw6-rjph-429f
A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.
BDU:2023-02164
Уязвимость функции io_file_get_fixed() модуля io_uring/io_uring.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
SUSE-SU-2023:2401-1
Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP3)
SUSE-SU-2023:2416-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3)
SUSE-SU-2023:2448-1
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP2)
SUSE-SU-2023:2423-1
Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP3)
SUSE-SU-2023:2405-1
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP3)
SUSE-SU-2023:2146-1
Security update for the Linux Kernel
SUSE-SU-2023:2148-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-1872 A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
CVE-2023-1872 A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
CVE-2023-1872 A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
CVSS3: 7 | 0% Низкий | почти 3 года назад | ||
CVE-2023-1872 A use-after-free vulnerability in the Linux Kernel io_uring system can ... | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
GHSA-jhw6-rjph-429f A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. | CVSS3: 7 | 0% Низкий | почти 3 года назад | |
BDU:2023-02164 Уязвимость функции io_file_get_fixed() модуля io_uring/io_uring.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7 | 0% Низкий | почти 4 года назад | |
SUSE-SU-2023:2401-1 Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP3) | больше 2 лет назад | |||
SUSE-SU-2023:2416-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3) | больше 2 лет назад | |||
SUSE-SU-2023:2448-1 Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP2) | больше 2 лет назад | |||
SUSE-SU-2023:2423-1 Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP3) | больше 2 лет назад | |||
SUSE-SU-2023:2405-1 Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP3) | больше 2 лет назад | |||
SUSE-SU-2023:2146-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:2148-1 Security update for the Linux Kernel | больше 2 лет назад |
Уязвимостей на страницу