Количество 35
Количество 35

CVE-2023-3777
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances. We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.

CVE-2023-3777
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances. We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.

CVE-2023-3777
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances. We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.
CVE-2023-3777
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ...

SUSE-SU-2023:4781-1
Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)
GHSA-3v7f-rjgx-9grq
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances. We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.

BDU:2023-04651
Уязвимость функции nf_tables_delrule() в модуле /net/netfilter/nf_tables_api.c сетевого экрана netfilter ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2023:4867-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)

SUSE-SU-2023:4839-1
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)

SUSE-SU-2023:4776-1
Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5)

SUSE-SU-2023:4871-1
Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP3)

SUSE-SU-2023:4862-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3)

SUSE-SU-2023:4836-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP3)

SUSE-SU-2023:4820-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP3)

SUSE-SU-2023:4817-1
Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP3)

SUSE-SU-2023:4863-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5)

SUSE-SU-2023:4849-1
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP4)

SUSE-SU-2023:4801-1
Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4)

SUSE-SU-2023:4775-1
Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5)

SUSE-SU-2023:4872-1
Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP4)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-3777 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances. We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-3777 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances. We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-3777 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances. We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад |
CVE-2023-3777 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ... | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:4781-1 Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) | 0% Низкий | больше 1 года назад | |
GHSA-3v7f-rjgx-9grq A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances. We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8. | CVSS3: 7.8 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-04651 Уязвимость функции nf_tables_delrule() в модуле /net/netfilter/nf_tables_api.c сетевого экрана netfilter ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
![]() | SUSE-SU-2023:4867-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4839-1 Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4776-1 Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4871-1 Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP3) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4862-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4836-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP3) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4820-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP3) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4817-1 Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP3) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4863-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4849-1 Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP4) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4801-1 Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4775-1 Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) | больше 1 года назад | ||
![]() | SUSE-SU-2023:4872-1 Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP4) | больше 1 года назад |
Уязвимостей на страницу