CVE-2023-3812
- EPSS 0.01%
- Veröffentlicht 24.07.2023 16:15:13
- Zuletzt bearbeitet 21.11.2024 08:18:07
An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially ...
CVE-2023-38200
- EPSS 0.21%
- Veröffentlicht 24.07.2023 16:15:12
- Zuletzt bearbeitet 21.11.2024 08:13:04
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
CVE-2023-3019
- EPSS 0.01%
- Veröffentlicht 24.07.2023 16:15:12
- Zuletzt bearbeitet 21.11.2024 08:16:15
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
CVE-2023-3567
- EPSS 0.01%
- Veröffentlicht 24.07.2023 16:15:12
- Zuletzt bearbeitet 21.11.2024 08:17:33
A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.
CVE-2023-33951
- EPSS 0.01%
- Veröffentlicht 24.07.2023 16:15:11
- Zuletzt bearbeitet 21.11.2024 08:06:16
A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privilege...
CVE-2023-33952
- EPSS 0.01%
- Veröffentlicht 24.07.2023 16:15:11
- Zuletzt bearbeitet 21.11.2024 08:06:16
A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object...
CVE-2022-2127
- EPSS 1.25%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 21.11.2024 07:00:22
An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable ...
CVE-2023-34966
- EPSS 15.9%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 21.11.2024 08:07:44
An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that c...
CVE-2023-34967
- EPSS 18.27%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 21.11.2024 08:07:44
A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be an...
CVE-2023-34968
- EPSS 2.2%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 06.12.2024 11:15:05
A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attack...