Логотип exploitDog
bind:CVE-2023-52824
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-52824

Количество 4

Количество 4

ubuntu логотип

CVE-2023-52824

больше 1 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2023-52824

больше 1 года назад

[REJECTED CVE] A memory handling vulnerability was identified in the Linux kernel's watch_queue subsystem. The issue stems from the lack of overflow checks when duplicating a user-space array with memdup_user(). This could allow an attacker to exploit the absence of safeguards, potentially leading to a denial-of-service condition.

EPSS: Низкий
nvd логотип

CVE-2023-52824

больше 1 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-f767-54f7-4qgq

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: kernel: watch_queue: copy user-array safely Currently, there is no overflow-check with memdup_user(). Use the new function memdup_array_user() instead of memdup_user() for duplicating the user-space array safely.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-52824

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

больше 1 года назад
redhat логотип
CVE-2023-52824

[REJECTED CVE] A memory handling vulnerability was identified in the Linux kernel's watch_queue subsystem. The issue stems from the lack of overflow checks when duplicating a user-space array with memdup_user(). This could allow an attacker to exploit the absence of safeguards, potentially leading to a denial-of-service condition.

больше 1 года назад
nvd логотип
CVE-2023-52824

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

больше 1 года назад
github логотип
GHSA-f767-54f7-4qgq

In the Linux kernel, the following vulnerability has been resolved: kernel: watch_queue: copy user-array safely Currently, there is no overflow-check with memdup_user(). Use the new function memdup_array_user() instead of memdup_user() for duplicating the user-space array safely.

больше 1 года назад

Уязвимостей на страницу