4.7
CVSSv3

CVE-2023-26545

Published: 25/02/2023 Updated: 03/05/2023
CVSS v3 Base Score: 4.7 | Impact Score: 3.6 | Exploitability Score: 1
VMScore: 0

Vulnerability Summary

In the Linux kernel prior to 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

netapp h300s_firmware -

netapp h500s_firmware -

netapp h700s_firmware -

netapp h410s_firmware -

netapp h410c_firmware -

Vendor Advisories

概要 Important: kernel security, bug fix, and enhancement update タイプ/重大度 Security Advisory: Important Red Hat Insights パッチ分析 このアドバイザリーの影響を受けるシステムを特定し、修正します。 影響を受けるシステムの表示 トピック An update for kernel is now available ...
Synopsis Low: Logging Subsystem 581- Red Hat OpenShift security update Type/Severity Security Advisory: Low Topic An update is now available for RHOL-58-RHEL-9Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, i ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel is now available for Red Hat Enterprise Linux 88 Extended Update SupportRed Hat Product Securit ...
Synopsis Low: Logging Subsystem 5710 - Red Hat OpenShift security update Type/Severity Security Advisory: Low Topic Low: Logging Subsystem 5710 - Red Hat OpenShift security updateRed Hat Product Security has rated this update as having a security impact of low A Common Vulnerability Scoring System (CVSS) base score, which gives a detaile ...
概要 Important: OpenShift Container Platform 411 low-latency extras update タイプ/重大度 Security Advisory: Important トピック An update for cnf-tests-container, dpdk-base-container and performance-addon-operator-must-gather-rhel8-container is now available for Red Hat OpenShift Container Platform 411 Secondary scheduler builds ...
Synopsis Important: OpenShift Container Platform 41247 security update Type/Severity Security Advisory: Important Topic Red Hat OpenShift Container Platform release 41247 is now available with updates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Container P ...
In the Linux kernel before 6113, there is a double free in net/mpls/af_mplsc upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device (CVE-2023-26545) ...
In the Linux kernel before 6113, there is a double free in net/mpls/af_mplsc upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device (CVE-2023-26545) ...
A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1 An attacker at L2 with code execution can execute code on an indirect branch on the ...
A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1 An attacker at L2 with code execution can execute code on an indirect branch on the ...
In the Linux kernel before 6113, there is a double free in net/mpls/af_mplsc upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device (CVE-2023-26545) ...
The upstream bug report describes this issue as follows: A flaw found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion Local user can trigger this with rds_message_put() Type confusion leads to `struct rds_msg_zcopy_info *info` actually ...
The upstream bug report describes this issue as follows: A flaw found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion Local user can trigger this with rds_message_put() Type confusion leads to `struct rds_msg_zcopy_info *info` actually ...
In the Linux kernel before 6113, there is a double free in net/mpls/af_mplsc upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device (CVE-2023-26545) ...
The upstream bug report describes this issue as follows: A flaw found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion Local user can trigger this with rds_message_put() Type confusion leads to `struct rds_msg_zcopy_info *info` actually ...
The upstream bug report describes this issue as follows: A flaw found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion Local user can trigger this with rds_message_put() Type confusion leads to `struct rds_msg_zcopy_info *info` actually ...
In the Linux kernel before 6113, there is a double free in net/mpls/af_mplsc upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device (CVE-2023-26545) ...
A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1 An attacker at L2 with code execution can execute code on an indirect branch on the ...