Show filters
253 Total Results
Displaying 31-40 of 253
Sort by:
Attacker Value
Unknown

CVE-2023-2953

Disclosure Date: May 30, 2023 (last updated October 08, 2023)
A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.
Attacker Value
Unknown

CVE-2023-2898

Disclosure Date: May 26, 2023 (last updated February 01, 2024)
There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.
Attacker Value
Unknown

CVE-2023-2124

Disclosure Date: May 15, 2023 (last updated February 01, 2024)
An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.
Attacker Value
Unknown

CVE-2023-32233

Disclosure Date: May 08, 2023 (last updated October 08, 2023)
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
Attacker Value
Unknown

CVE-2023-2236

Disclosure Date: May 01, 2023 (last updated February 14, 2025)
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.
Attacker Value
Unknown

CVE-2023-0045

Disclosure Date: April 25, 2023 (last updated February 14, 2025)
The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set  function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall.  The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96
Attacker Value
Unknown

CVE-2023-2269

Disclosure Date: April 25, 2023 (last updated February 01, 2024)
A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.
Attacker Value
Unknown

CVE-2023-2007

Disclosure Date: April 24, 2023 (last updated February 01, 2024)
The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.
Attacker Value
Unknown

CVE-2023-2006

Disclosure Date: April 24, 2023 (last updated October 08, 2023)
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
Attacker Value
Unknown

CVE-2023-31084

Disclosure Date: April 24, 2023 (last updated November 02, 2023)
An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process.