The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade torvalds/linux
to version 6.7-rc7 or higher.
Affected versions of this package are vulnerable to Race Condition via the processing of ICMPv6 Router Advertisement packets. An attacker can cause arbitrary code execution by sending a specially crafted ICMPv6 router advertisement packet from an adjacent network.
Note:
This is only exploitable if net.ipv6.conf.[NIC].accept_ra
is enabled, which is disabled by default on Red Hat Enterprise Linux, limiting the attack to local vectors.
Check net.ipv6.conf.[NIC].accept_ra param value with the command cat /proc/sys/net/ipv6/conf/default/accept_ra
or /proc/sys/net/ipv6/conf/eth0/accept_ra
(where eth0 is the name of the networking interface).
If you cannot run this or a similar command and parameter accept_ra is not available, then IPV6 is disabled. If IPV6 is not being used, it is possible to disable it completely, and there is instruction on how to do this.