Количество 23
Количество 23
CVE-2023-42754
A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.
CVE-2023-42754
A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.
CVE-2023-42754
A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.
CVE-2023-42754
Kernel: ipv4: null pointer dereference in ipv4_send_dest_unreach()
CVE-2023-42754
A NULL pointer dereference flaw was found in the Linux kernel ipv4 sta ...
GHSA-7h73-9whc-fg4g
A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.
BDU:2023-06420
Уязвимость функции ipv4_send_dest_unreach() в модуле net/ipv4/route.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2023:4377-1
Security update for the Linux Kernel
SUSE-SU-2023:4348-1
Security update for the Linux Kernel
SUSE-SU-2023:4035-1
Security update for the Linux Kernel
SUSE-SU-2023:4033-1
Security update for the Linux Kernel
SUSE-SU-2023:4032-1
Security update for the Linux Kernel
SUSE-SU-2023:4031-1
Security update for the Linux Kernel
SUSE-SU-2023:4071-1
Security update for the Linux Kernel
SUSE-SU-2023:4347-1
Security update for the Linux Kernel
SUSE-SU-2023:4093-1
Security update for the Linux Kernel
SUSE-SU-2023:4072-2
Security update for the Linux Kernel
SUSE-SU-2023:4072-1
Security update for the Linux Kernel
SUSE-SU-2023:4058-1
Security update for the Linux Kernel
SUSE-SU-2023:4057-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-42754 A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-42754 A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-42754 A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-42754 Kernel: ipv4: null pointer dereference in ipv4_send_dest_unreach() | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-42754 A NULL pointer dereference flaw was found in the Linux kernel ipv4 sta ... | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
GHSA-7h73-9whc-fg4g A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
BDU:2023-06420 Уязвимость функции ipv4_send_dest_unreach() в модуле net/ipv4/route.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
SUSE-SU-2023:4377-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4348-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4035-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4033-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4032-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4031-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4071-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4347-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4093-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4072-2 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4072-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4058-1 Security update for the Linux Kernel | около 2 лет назад | |||
SUSE-SU-2023:4057-1 Security update for the Linux Kernel | около 2 лет назад |
Уязвимостей на страницу