2023-06-05
|
CVE-2023-3079
|
Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
Couchbase_server, Debian_linux, Fedora, Chrome
|
8.8
|
|
|
2023-06-06
|
CVE-2023-33460
|
There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse function. which will cause out-of-memory in server and cause crash.
|
Debian_linux, Fedora, Yajl
|
6.5
|
|
|
2023-11-14
|
CVE-2023-23583
|
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
|
Debian_linux, Core_i3\-1005g1_firmware, Core_i3\-10100y_firmware, Core_i3\-10110u_firmware, Core_i3\-10110y_firmware, Core_i3\-11100he_firmware, Core_i3\-1110g4_firmware, Core_i3\-1115g4_firmware, Core_i3\-1115g4e_firmware, Core_i3\-1115gre_firmware, Core_i3\-1120g4_firmware, Core_i3\-1125g4_firmware, Core_i5\-10200h_firmware, Core_i5\-10210u_firmware, Core_i5\-10210y_firmware, Core_i5\-10300h_firmware, Core_i5\-10310u_firmware, Core_i5\-10310y_firmware, Core_i5\-1035g1_firmware, Core_i5\-1035g4_firmware, Core_i5\-1035g7_firmware, Core_i5\-10400h_firmware, Core_i5\-10500h_firmware, Core_i5\-11260h_firmware, Core_i5\-11300h_firmware, Core_i5\-1130g7_firmware, Core_i5\-11320h, Core_i5\-1135g7_firmware, Core_i5\-11400_firmware, Core_i5\-11400f_firmware, Core_i5\-11400h_firmware, Core_i5\-11400t_firmware, Core_i5\-1140g7_firmware, Core_i5\-1145g7_firmware, Core_i5\-1145g7e_firmware, Core_i5\-1145gre_firmware, Core_i5\-11500_firmware, Core_i5\-11500h_firmware, Core_i5\-11500he_firmware, Core_i5\-11500t_firmware, Core_i5\-1155g7, Core_i5\-11600_firmware, Core_i5\-11600k_firmware, Core_i5\-11600kf_firmware, Core_i5\-11600t_firmware, Core_i7\-10510u_firmware, Core_i7\-10510y_firmware, Core_i7\-10610u_firmware, Core_i7\-1065g7_firmware, Core_i7\-10710u_firmware, Core_i7\-10750h_firmware, Core_i7\-10810u_firmware, Core_i7\-10850h_firmware, Core_i7\-10870h_firmware, Core_i7\-10875h_firmware, Core_i7\-11370h_firmware, Core_i7\-11375h_firmware, Core_i7\-11390h_firmware, Core_i7\-11600h_firmware, Core_i7\-1160g7_firmware, Core_i7\-1165g7_firmware, Core_i7\-11700_firmware, Core_i7\-11700f_firmware, Core_i7\-11700k_firmware, Core_i7\-11700kf_firmware, Core_i7\-11700t_firmware, Core_i7\-11800h_firmware, Core_i7\-1180g7_firmware, Core_i7\-11850h_firmware, Core_i7\-11850he_firmware, Core_i7\-1185g7_firmware, Core_i7\-1185g7e_firmware, Core_i7\-1185gre_firmware, Core_i7\-1195g7_firmware, Core_i9\-10885h_firmware, Core_i9\-10980hk_firmware, Core_i9\-11900_firmware, Core_i9\-11900f_firmware, Core_i9\-11900h_firmware, Core_i9\-11900k_firmware, Core_i9\-11900kf_firmware, Core_i9\-11900t_firmware, Core_i9\-11950h_firmware, Core_i9\-11980hk_firmware, Xeon_d\-1513n_firmware, Xeon_d\-1518_firmware, Xeon_d\-1520_firmware, Xeon_d\-1521_firmware, Xeon_d\-1523n_firmware, Xeon_d\-1527_firmware, Xeon_d\-1528_firmware, Xeon_d\-1529_firmware, Xeon_d\-1531_firmware, Xeon_d\-1533n_firmware, Xeon_d\-1537_firmware, Xeon_d\-1539_firmware, Xeon_d\-1540_firmware, Xeon_d\-1541_firmware, Xeon_d\-1543n_firmware, Xeon_d\-1548_firmware, Xeon_d\-1553n_firmware, Xeon_d\-1557_firmware, Xeon_d\-1559_firmware, Xeon_d\-1567_firmware, Xeon_d\-1571_firmware, Xeon_d\-1577_firmware, Xeon_d\-1602_firmware, Xeon_d\-1622_firmware, Xeon_d\-1623n_firmware, Xeon_d\-1627_firmware, Xeon_d\-1633n_firmware, Xeon_d\-1637_firmware, Xeon_d\-1649n_firmware, Xeon_d\-1653n_firmware, Xeon_d\-1702_firmware, Xeon_d\-1712tr_firmware, Xeon_d\-1713nt_firmware, Xeon_d\-1713nte_firmware, Xeon_d\-1714_firmware, Xeon_d\-1715ter_firmware, Xeon_d\-1718t_firmware, Xeon_d\-1722ne_firmware, Xeon_d\-1726_firmware, Xeon_d\-1731nte_firmware, Xeon_d\-1732te_firmware, Xeon_d\-1733nt_firmware, Xeon_d\-1734nt_firmware, Xeon_d\-1735tr_firmware, Xeon_d\-1736_firmware, Xeon_d\-1736nt_firmware, Xeon_d\-1739_firmware, Xeon_d\-1746ter_firmware, Xeon_d\-1747nte_firmware, Xeon_d\-1748te_firmware, Xeon_d\-1749nt_firmware, Xeon_d\-2123it_firmware, Xeon_d\-2141i_firmware, Xeon_d\-2142it_firmware, Xeon_d\-2143it_firmware, Xeon_d\-2145nt_firmware, Xeon_d\-2146nt_firmware, Xeon_d\-2161i_firmware, Xeon_d\-2163it_firmware, Xeon_d\-2166nt_firmware, Xeon_d\-2173it_firmware, Xeon_d\-2177nt_firmware, Xeon_d\-2183it_firmware, Xeon_d\-2187nt_firmware, Xeon_d\-2712t_firmware, Xeon_d\-2733nt_firmware, Xeon_d\-2738_firmware, Xeon_d\-2745nx_firmware, Xeon_d\-2752nte_firmware, Xeon_d\-2752ter_firmware, Xeon_d\-2753nt_firmware, Xeon_d\-2757nx_firmware, Xeon_d\-2766nt_firmware, Xeon_d\-2775te_firmware, Xeon_d\-2776nt_firmware, Xeon_d\-2777nx_firmware, Xeon_d\-2779_firmware, Xeon_d\-2786nte_firmware, Xeon_d\-2795nt_firmware, Xeon_d\-2796nt_firmware, Xeon_d\-2796te_firmware, Xeon_d\-2798nt_firmware, Xeon_d\-2798nx_firmware, Xeon_d\-2799_firmware, Xeon_gold_5315y_firmware, Xeon_gold_5317_firmware, Xeon_gold_5318h_firmware, Xeon_gold_5318n_firmware, Xeon_gold_5318s_firmware, Xeon_gold_5318y_firmware, Xeon_gold_5320_firmware, Xeon_gold_5320h_firmware, Xeon_gold_5320t_firmware, Xeon_gold_6312u_firmware, Xeon_gold_6314u_firmware, Xeon_gold_6326_firmware, Xeon_gold_6328h_firmware, Xeon_gold_6328hl_firmware, Xeon_gold_6330_firmware, Xeon_gold_6330h_firmware, Xeon_gold_6330n_firmware, Xeon_gold_6334_firmware, Xeon_gold_6336y_firmware, Xeon_gold_6338_firmware, Xeon_gold_6338n_firmware, Xeon_gold_6338t_firmware, Xeon_gold_6342_firmware, Xeon_gold_6346_firmware, Xeon_gold_6348_firmware, Xeon_gold_6348h_firmware, Xeon_gold_6354_firmware, Xeon_platinum_8351n_firmware, Xeon_platinum_8352m_firmware, Xeon_platinum_8352s_firmware, Xeon_platinum_8352v_firmware, Xeon_platinum_8352y_firmware, Xeon_platinum_8353h_firmware, Xeon_platinum_8354h_firmware, Xeon_platinum_8356h_firmware, Xeon_platinum_8358_firmware, Xeon_platinum_8358p_firmware, Xeon_platinum_8360h_firmware, Xeon_platinum_8360hl_firmware, Xeon_platinum_8360y_firmware, Xeon_platinum_8362_firmware, Xeon_platinum_8368_firmware, Xeon_platinum_8376h_firmware, Xeon_platinum_8376hl_firmware, Xeon_platinum_8380_firmware, Xeon_platinum_8380h_firmware, Xeon_platinum_8380hl_firmware, Xeon_silver_4309y_firmware, Xeon_silver_4310_firmware, Xeon_silver_4310t_firmware, Xeon_silver_4314_firmware, Xeon_silver_4316_firmware, Affa900_firmware, Fas2820_firmware, Fas9500_firmware
|
7.8
|
|
|
2024-04-03
|
CVE-2024-26688
|
In the Linux kernel, the following vulnerability has been resolved:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
When configuring a hugetlb filesystem via the fsconfig() syscall, there is
a possible NULL dereference in hugetlbfs_fill_super() caused by assigning
NULL to ctx->hstate in hugetlbfs_parse_param() when the requested pagesize
is non valid.
E.g: Taking the following steps:
fd = fsopen("hugetlbfs", FSOPEN_CLOEXEC);
fsconfig(fd, FSCONFIG_SET_STRING,...
|
Debian_linux, Linux_kernel
|
5.5
|
|
|
2024-04-03
|
CVE-2024-26754
|
In the Linux kernel, the following vulnerability has been resolved:
gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()
The gtp_net_ops pernet operations structure for the subsystem must be
registered before registering the generic netlink family.
Syzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:
general protection fault, probably for non-canonical address
0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range...
|
Debian_linux, Linux_kernel
|
7.8
|
|
|
2024-04-17
|
CVE-2024-26855
|
In the Linux kernel, the following vulnerability has been resolved:
net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()
The function ice_bridge_setlink() may encounter a NULL pointer dereference
if nlmsg_find_attr() returns NULL and br_spec is dereferenced subsequently
in nla_for_each_nested(). To address this issue, add a check to ensure that
br_spec is not NULL before proceeding with the nested attribute iteration.
|
Debian_linux, Linux_kernel
|
5.5
|
|
|
2023-06-07
|
CVE-2023-0666
|
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
|
Debian_linux, Wireshark
|
6.5
|
|
|
2023-06-07
|
CVE-2023-0668
|
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
|
Debian_linux, Wireshark
|
6.5
|
|
|
2024-03-06
|
CVE-2024-26625
|
In the Linux kernel, the following vulnerability has been resolved:
llc: call sock_orphan() at release time
syzbot reported an interesting trace [1] caused by a stale sk->sk_wq
pointer in a closed llc socket.
In commit ff7b11aa481f ("net: socket: set sock->sk to NULL after
calling proto_ops::release()") Eric Biggers hinted that some protocols
are missing a sock_orphan(), we need to perform a full audit.
In net-next, I plan to clear sock->sk from sock_orphan() and
amend Eric patch to add...
|
Debian_linux, Linux_kernel
|
7.8
|
|
|
2024-04-02
|
CVE-2024-26663
|
In the Linux kernel, the following vulnerability has been resolved:
tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
syzbot reported the following general protection fault [1]:
general protection fault, probably for non-canonical address 0xdffffc0000000010: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000080-0x0000000000000087]
...
RIP: 0010:tipc_udp_is_known_peer+0x9c/0x250 net/tipc/udp_media.c:291
...
Call Trace:
<TASK>
...
|
Debian_linux, Linux_kernel
|
5.5
|
|
|