Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux layer 2 tunneling protocol vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-0045
The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only ...
Linux Linux Kernel
Debian Debian Linux 10.0
Netapp Active Iq Unified Manager -
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H410s Firmware -
Netapp H410c Firmware -
NA
CVE-2023-0394
A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
Linux Linux Kernel
Linux Linux Kernel 6.2
NA
CVE-2022-47929
In the Linux kernel prior to 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class&qu...
Linux Linux Kernel
Debian Debian Linux 11.0
NA
CVE-2023-23454
cbq_classify in net/sched/sch_cbq.c in the Linux kernel up to and including 6.1.4 allows malicious users to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classif...
Linux Linux Kernel
Debian Debian Linux 11.0
NA
CVE-2023-23455
atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel up to and including 6.1.4 allows malicious users to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
Linux Linux Kernel
Debian Debian Linux 11.0
NA
CVE-2022-4129
A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.
Linux Layer 2 Tunneling Protocol
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Fedoraproject Fedora 37
7.2
CVSSv2
CVE-2014-3534
arch/s390/kernel/ptrace.c in the Linux kernel prior to 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently ga...
Linux Linux Kernel
Debian Debian Linux 7.0
7.1
CVSSv2
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0\\(16\\)sc3
Cisco Ios 12.2\\(3.4\\)bp
Cisco Ios 11.2xa
Cisco Ios 12.4\\(2\\)t2
Cisco Ios 12.3ym
Cisco Ios 11.3\\(11b\\)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0\\(21\\)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1\\(2\\)e1
Cisco Ios 12.1xg
Cisco Ios 12.1\\(19\\)ew
Cisco Ios 12.3\\(14\\)ym4
Cisco Ios 12.0\\(8\\)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2\\(7b\\)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3\\(10\\)
1 Github repository
7.8
CVSSv2
CVE-2006-5873
Buffer overflow in the cluster_process_heartbeat function in cluster.c in layer 2 tunneling protocol network server (l2tpns) prior to 2.1.21 allows remote malicious users to cause a denial of service via a large heartbeat packet.
L2tpns L2tpns 1.1
L2tpns L2tpns 2.0.13
L2tpns L2tpns 2.1
Debian Debian Linux 3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3661
open redirect
CVE-2024-25512
CVE-2024-33788
command injection
SSTI
CVE-2024-0043
CVE-2024-29210
CVE-2024-25510
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started