CVE-2023-42755
- EPSS 0.01%
- Veröffentlicht 05.10.2023 19:15:11
- Zuletzt bearbeitet 21.11.2024 08:23:06
A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a loca...
CVE-2023-42753
- EPSS 0.01%
- Veröffentlicht 25.09.2023 21:15:15
- Zuletzt bearbeitet 21.11.2024 08:23:06
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory...
CVE-2023-34319
- EPSS 0.01%
- Veröffentlicht 22.09.2023 14:15:45
- Zuletzt bearbeitet 04.11.2025 20:16:29
The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of ...
CVE-2023-4921
- EPSS 0.01%
- Veröffentlicht 12.09.2023 20:15:10
- Zuletzt bearbeitet 13.02.2025 18:15:48
A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq...
- EPSS 0.04%
- Veröffentlicht 11.09.2023 17:15:07
- Zuletzt bearbeitet 07.11.2023 04:23:08
Rejected reason: CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.
- EPSS 0.04%
- Veröffentlicht 06.09.2023 14:15:12
- Zuletzt bearbeitet 13.02.2025 18:15:46
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. ...
CVE-2023-4623
- EPSS 0.02%
- Veröffentlicht 06.09.2023 14:15:12
- Zuletzt bearbeitet 20.03.2025 16:59:51
A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a pare...
CVE-2023-4206
- EPSS 0.06%
- Veröffentlicht 06.09.2023 14:15:11
- Zuletzt bearbeitet 13.02.2025 17:17:16
A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the n...
CVE-2023-4207
- EPSS 0.03%
- Veröffentlicht 06.09.2023 14:15:11
- Zuletzt bearbeitet 13.02.2025 17:17:16
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new inst...
CVE-2023-4208
- EPSS 0.03%
- Veröffentlicht 06.09.2023 14:15:11
- Zuletzt bearbeitet 13.02.2025 17:17:16
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new in...