CVE-2023-4623
- EPSS 0.02%
- Veröffentlicht 06.09.2023 14:15:12
- Zuletzt bearbeitet 20.03.2025 16:59:51
A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a pare...
CVE-2023-4206
- EPSS 0.06%
- Veröffentlicht 06.09.2023 14:15:11
- Zuletzt bearbeitet 13.02.2025 17:17:16
A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the n...
CVE-2023-4207
- EPSS 0.03%
- Veröffentlicht 06.09.2023 14:15:11
- Zuletzt bearbeitet 13.02.2025 17:17:16
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new inst...
CVE-2023-4208
- EPSS 0.03%
- Veröffentlicht 06.09.2023 14:15:11
- Zuletzt bearbeitet 13.02.2025 17:17:16
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new in...
- EPSS 0.02%
- Veröffentlicht 06.09.2023 14:15:11
- Zuletzt bearbeitet 13.02.2025 17:17:16
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage colle...
CVE-2023-40283
- EPSS 0.01%
- Veröffentlicht 14.08.2023 03:15:09
- Zuletzt bearbeitet 25.02.2026 18:17:01
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
CVE-2023-25775
- EPSS 0.58%
- Veröffentlicht 11.08.2023 03:15:18
- Zuletzt bearbeitet 21.11.2024 07:50:10
Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
CVE-2022-40982
- EPSS 0.73%
- Veröffentlicht 11.08.2023 03:15:14
- Zuletzt bearbeitet 21.11.2024 07:22:21
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2023-3772
- EPSS 0.01%
- Veröffentlicht 25.07.2023 16:15:11
- Zuletzt bearbeitet 21.11.2024 08:18:01
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possibl...
CVE-2023-20593
- EPSS 5.88%
- Veröffentlicht 24.07.2023 20:15:10
- Zuletzt bearbeitet 13.02.2025 17:16:01
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.