Show filters
2,371 Total Results
Displaying 241-250 of 2,371
Sort by:
Attacker Value
Unknown
CVE-2023-38426
Disclosure Date: July 18, 2023 (last updated February 25, 2025)
An issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length.
0
Attacker Value
Unknown
CVE-2023-38403
Disclosure Date: July 17, 2023 (last updated February 25, 2025)
iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.
0
Attacker Value
Unknown
CVE-2023-2975
Disclosure Date: July 14, 2023 (last updated February 25, 2025)
Issue summary: The AES-SIV cipher implementation contains a bug that causes
it to ignore empty associated data entries which are unauthenticated as
a consequence.
Impact summary: Applications that use the AES-SIV algorithm and want to
authenticate empty data entries as associated data can be misled by removing,
adding or reordering such empty entries as these are ignored by the OpenSSL
implementation. We are currently unaware of any such applications.
The AES-SIV algorithm allows for authentication of multiple associated
data entries along with the encryption. To authenticate empty data the
application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with
NULL pointer as the output buffer and 0 as the input buffer length.
The AES-SIV implementation in OpenSSL just returns success for such a call
instead of performing the associated data authentication operation.
The empty data thus will not be authenticated.
As this issue does not affect non-empty associated data authenticat…
0
Attacker Value
Unknown
CVE-2023-32254
Disclosure Date: July 10, 2023 (last updated February 25, 2025)
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
0
Attacker Value
Unknown
CVE-2023-32250
Disclosure Date: July 10, 2023 (last updated February 25, 2025)
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
0
Attacker Value
Unknown
CVE-2023-35001
Disclosure Date: July 05, 2023 (last updated February 25, 2025)
Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace
0
Attacker Value
Unknown
CVE-2023-3338
Disclosure Date: June 30, 2023 (last updated February 25, 2025)
A null pointer dereference flaw was found in the Linux kernel's DECnet networking protocol. This issue could allow a remote user to crash the system.
0
Attacker Value
Unknown
CVE-2023-3390
Disclosure Date: June 28, 2023 (last updated February 25, 2025)
A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.
Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.
We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
0
Attacker Value
Unknown
CVE-2023-1295
Disclosure Date: June 28, 2023 (last updated February 25, 2025)
A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5.6 - 5.11 (inclusive), which allows a local user to elevate their privileges to root. Introduced in b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb, patched in 9eac1904d3364254d622bf2c771c4f85cd435fc2, backported to stable in 788d0824269bef539fe31a785b1517882eafed93.
0
Attacker Value
Unknown
CVE-2023-3212
Disclosure Date: June 23, 2023 (last updated February 25, 2025)
A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.
0