Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3403-1 | linux security update |
Debian DLA |
DLA-3404-1 | linux-5.10 security update |
EUVD |
EUVD-2023-12512 | A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11 |
Ubuntu USN |
USN-6079-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6091-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6093-1 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-6096-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6134-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6222-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Ubuntu USN |
USN-6254-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6256-1 | Linux kernel (IoT) vulnerabilities |
Ubuntu USN |
USN-6341-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6385-1 | Linux kernel (OEM) vulnerabilities |
Thu, 30 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T16:38:58.312Z
Reserved: 2023-01-24T09:43:28.025Z
Link: CVE-2023-0458
Updated: 2024-08-02T05:10:56.346Z
Status : Modified
Published: 2023-04-26T19:15:08.720
Modified: 2024-11-21T07:37:13.053
Link: CVE-2023-0458
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN