It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)
It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1872)
More Stories
rust-below-0.9.0-1.el8
FEDORA-EPEL-2025-ae12e02519 Packages in this update: rust-below-0.9.0-1.el8 Update description: A privilege escalation vulnerability existed in the Below service prior to v0.9.0...
DSA-5894-1 jetty9 – security update
Jetty 9 is a Java based web server and servlet engine. Several security vulnerabilities have been discovered which may allow...
DSA-5893-1 tomcat10 – security update
A security vulnerability was found in Tomcat 10, a Java based web server and servlet engine. A malicious user was...
USN-7402-3: Linux kernel (NVIDIA) vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This...
webkitgtk-2.48.1-2.fc40
FEDORA-2025-256a86d7c8 Packages in this update: webkitgtk-2.48.1-2.fc40 Update description: Limit the data stored in session state. Remove the empty area below...