Msrc Cm1 Kernel 5.10.167.1-1 On Cbl Mariner 1.0 vulnerabilities
5 known vulnerabilities affecting msrc/cm1_kernel_5.10.167.1-1_on_cbl_mariner_1.0.
Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM4
Vulnerabilities
Page 1 of 1
CVE-2022-41858HIGHCVSS 7.12023-01-10
CVE-2022-41858 [HIGH] CWE-476 A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker
A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.
FAQ: Is Azu
msrc
CVE-2023-23455MEDIUMCVSS 5.52023-01-10
CVE-2023-23455 [MEDIUM] CWE-843 atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SH
atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
FAQ: Is Az
msrc
CVE-2023-23454MEDIUMCVSS 5.52023-01-10
CVE-2023-23454 [MEDIUM] CWE-843 cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can someti
cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classificati
msrc
CVE-2022-47929MEDIUMCVSS 5.52023-01-10
CVE-2022-47929 [MEDIUM] CWE-476 In the Linux kernel before 6.1.6 a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control
In the Linux kernel before 6.1.6 a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" comman
msrc
CVE-2023-0394MEDIUMCVSS 5.52023-01-10
CVE-2023-0394 [MEDIUM] CWE-476 A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially a
msrc