Show filters
4,656 Total Results
Displaying 161-170 of 4,656
Sort by:
Attacker Value
Unknown

CVE-2023-52355

Disclosure Date: January 25, 2024 (last updated April 25, 2024)
An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.
Attacker Value
Unknown

CVE-2023-40547

Disclosure Date: January 25, 2024 (last updated April 29, 2024)
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
Attacker Value
Unknown

CVE-2024-0775

Disclosure Date: January 22, 2024 (last updated April 25, 2024)
A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.
Attacker Value
Unknown

CVE-2023-6531

Disclosure Date: January 21, 2024 (last updated April 30, 2024)
A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.
Attacker Value
Unknown

CVE-2024-0607

Disclosure Date: January 18, 2024 (last updated April 25, 2024)
A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.
Attacker Value
Unknown

CVE-2024-0409

Disclosure Date: January 18, 2024 (last updated May 22, 2024)
A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.
Attacker Value
Unknown

CVE-2024-0408

Disclosure Date: January 18, 2024 (last updated May 22, 2024)
A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.
Attacker Value
Unknown

CVE-2024-0646

Disclosure Date: January 17, 2024 (last updated August 28, 2024)
An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Attacker Value
Unknown

CVE-2024-0641

Disclosure Date: January 17, 2024 (last updated April 25, 2024)
A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel’s TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.
Attacker Value
Unknown

CVE-2024-0639

Disclosure Date: January 17, 2024 (last updated April 25, 2024)
A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.