CVE-2023-4623
- EPSS 0.02%
- Veröffentlicht 06.09.2023 14:15:12
- Zuletzt bearbeitet 20.03.2025 16:59:51
A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a pare...
CVE-2023-4206
- EPSS 0.06%
- Veröffentlicht 06.09.2023 14:15:11
- Zuletzt bearbeitet 13.02.2025 17:17:16
A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the n...
CVE-2023-4207
- EPSS 0.03%
- Veröffentlicht 06.09.2023 14:15:11
- Zuletzt bearbeitet 13.02.2025 17:17:16
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new inst...
CVE-2023-4208
- EPSS 0.03%
- Veröffentlicht 06.09.2023 14:15:11
- Zuletzt bearbeitet 13.02.2025 17:17:16
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new in...
- EPSS 0.02%
- Veröffentlicht 06.09.2023 14:15:11
- Zuletzt bearbeitet 13.02.2025 17:17:16
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage colle...
CVE-2023-40283
- EPSS 0.01%
- Veröffentlicht 14.08.2023 03:15:09
- Zuletzt bearbeitet 25.02.2026 18:17:01
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
CVE-2022-40982
- EPSS 0.73%
- Veröffentlicht 11.08.2023 03:15:14
- Zuletzt bearbeitet 21.11.2024 07:22:21
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- EPSS 0.04%
- Veröffentlicht 10.08.2023 17:15:12
- Zuletzt bearbeitet 14.11.2023 12:15:20
Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206...
CVE-2023-20569
- EPSS 1.95%
- Veröffentlicht 08.08.2023 18:15:11
- Zuletzt bearbeitet 21.11.2024 07:41:08
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. ...
CVE-2023-20588
- EPSS 6.7%
- Veröffentlicht 08.08.2023 18:15:11
- Zuletzt bearbeitet 21.11.2024 07:41:10
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.