![]() ![]() ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission) ZED! for Windows before Q.2021.2 (ANSSI qualification submission) ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission) ZONECENTRAL for Windows before 2023.5 ZEDMAIL for Windows before 2023.5 and ZED! for Windows, Mac, Linux before 2023.5 include an encrypted version of sensitive user information, which could allow an unauthenticated attacker to obtain it via brute force. This issue may result in a denial of service from guest to host via zero length descriptor.īy default. This issue may allow a malicious local privileged user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.īt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.Ī flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.Ī use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.Īn issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.Īn issue was discovered in the Linux kernel before 6.6.8. ![]() We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.Īn issue was discovered in the Linux kernel before 6.6.8. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.Ī use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Windows is unaffected.* This vulnerability affects Firefox ESR password was freed but the field was not set to NULL which could lead to double free. *This bug only affects Firefox on Unix-based operating systems (Android, Linux, MacOS). When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group(). We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.Ī heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. This issue could be exploited to trigger a denial of service.Ī use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. ![]() ![]() This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow.Ī null pointer dereference vulnerability was found in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() in drivers/net/wireless/ath/ath10k/wmi-tlv.c in the Linux kernel. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.Ī memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |