CVE-2023-33203
- EPSS 0.02%
- Veröffentlicht 18.05.2023 08:15:08
- Zuletzt bearbeitet 05.05.2025 16:15:40
The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.
CVE-2023-1859
- EPSS 0.01%
- Veröffentlicht 17.05.2023 23:15:09
- Zuletzt bearbeitet 18.03.2025 19:15:40
A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information ...
CVE-2023-2124
- EPSS 0.02%
- Veröffentlicht 15.05.2023 22:15:12
- Zuletzt bearbeitet 21.11.2024 07:57:58
An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the s...
CVE-2023-2156
- EPSS 0.44%
- Veröffentlicht 09.05.2023 22:15:10
- Zuletzt bearbeitet 21.11.2024 07:58:02
A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthentic...
CVE-2023-2513
- EPSS 0.01%
- Veröffentlicht 08.05.2023 21:15:11
- Zuletzt bearbeitet 23.04.2025 17:16:29
A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.
CVE-2023-32233
- EPSS 0.49%
- Veröffentlicht 08.05.2023 20:15:20
- Zuletzt bearbeitet 05.05.2025 16:15:39
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs ...
CVE-2023-32269
- EPSS 0.01%
- Veröffentlicht 05.05.2023 17:15:09
- Zuletzt bearbeitet 05.05.2025 16:15:40
An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the syste...
CVE-2023-2235
- EPSS 0.01%
- Veröffentlicht 01.05.2023 13:15:44
- Zuletzt bearbeitet 21.11.2024 07:58:12
A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups()...
CVE-2023-2236
- EPSS 0.03%
- Veröffentlicht 01.05.2023 13:15:44
- Zuletzt bearbeitet 13.02.2025 17:16:20
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which lea...
CVE-2023-31436
- EPSS 0.04%
- Veröffentlicht 28.04.2023 02:15:09
- Zuletzt bearbeitet 21.11.2024 08:01:51
qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.