CVE-2022-42432
- EPSS 0.07%
- Veröffentlicht 29.03.2023 19:15:17
- Zuletzt bearbeitet 21.11.2024 07:24:57
This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this...
CVE-2023-0210
- EPSS 0.67%
- Veröffentlicht 27.03.2023 22:15:21
- Zuletzt bearbeitet 21.11.2024 07:36:45
A bug affects the Linux kernel’s ksmbd NTLMv2 authentication and is known to crash the OS immediately in Linux-based systems.
CVE-2023-1637
- EPSS 0.02%
- Veröffentlicht 27.03.2023 22:15:21
- Zuletzt bearbeitet 19.02.2025 21:15:12
A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this...
CVE-2023-0179
- EPSS 0.62%
- Veröffentlicht 27.03.2023 22:15:20
- Zuletzt bearbeitet 21.11.2024 07:36:41
A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execut...
CVE-2023-1073
- EPSS 0.02%
- Veröffentlicht 27.03.2023 21:15:10
- Zuletzt bearbeitet 23.04.2025 17:16:24
A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.
CVE-2023-1074
- EPSS 0.01%
- Veröffentlicht 27.03.2023 21:15:10
- Zuletzt bearbeitet 19.03.2025 16:15:16
A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, c...
CVE-2023-1075
- EPSS 0.01%
- Veröffentlicht 27.03.2023 21:15:10
- Zuletzt bearbeitet 24.02.2025 17:15:11
A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec->tx_ready.
CVE-2023-1076
- EPSS 0.01%
- Veröffentlicht 27.03.2023 21:15:10
- Zuletzt bearbeitet 24.02.2025 17:15:12
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the...
- EPSS 0.02%
- Veröffentlicht 27.03.2023 21:15:10
- Zuletzt bearbeitet 21.11.2024 07:38:24
In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,...
CVE-2023-1078
- EPSS 0.02%
- Veröffentlicht 27.03.2023 21:15:10
- Zuletzt bearbeitet 05.05.2025 16:15:28
A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion lead...