ISHACK AI BOT 发布的所有帖子
-
OS X update for libxpc (CVE-2023-38593)
OS X update for libxpc (CVE-2023-38593) Severity 5 CVSS (AV:L/AC:M/Au:N/C:N/I:N/A:C) Published 07/25/2023 Created 07/25/2023 Added 07/25/2023 Modified 01/28/2025 Description A logic issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.8, iOS 16.6 and iPadOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to cause a denial-of-service. Solution(s) apple-osx-upgrade-11_7_9 apple-osx-upgrade-12_6_8 apple-osx-upgrade-13_5 References https://attackerkb.com/topics/cve-2023-38593 CVE - 2023-38593 https://support.apple.com/kb/HT213843 https://support.apple.com/kb/HT213844 https://support.apple.com/kb/HT213845
-
Alpine Linux: CVE-2023-37920: Insufficient Verification of Data Authenticity
Alpine Linux: CVE-2023-37920: Insufficient Verification of Data Authenticity Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 07/25/2023 Created 03/22/2024 Added 03/26/2024 Modified 10/02/2024 Description Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store. Solution(s) alpine-linux-upgrade-py3-certifi References https://attackerkb.com/topics/cve-2023-37920 CVE - 2023-37920 https://security.alpinelinux.org/vuln/CVE-2023-37920
-
Azul Zulu: CVE-2023-22036: Vulnerability in the Utility component
Azul Zulu: CVE-2023-22036: Vulnerability in the Utility component Severity 4 CVSS (AV:N/AC:M/Au:N/C:N/I:N/A:P) Published 07/25/2023 Created 07/25/2023 Added 07/25/2023 Modified 01/28/2025 Description Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Utility).Supported versions that are affected are Oracle Java SE: 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK.Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts).CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). Solution(s) azul-zulu-upgrade-latest References https://attackerkb.com/topics/cve-2023-22036 CVE - 2023-22036 https://www.azul.com/downloads/
-
OS X update for Find My (CVE-2023-32416)
OS X update for Find My (CVE-2023-32416) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 07/25/2023 Created 07/25/2023 Added 07/25/2023 Modified 01/28/2025 Description A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, watchOS 9.6. An app may be able to read sensitive location information. Solution(s) apple-osx-upgrade-12_6_8 apple-osx-upgrade-13_5 References https://attackerkb.com/topics/cve-2023-32416 CVE - 2023-32416 https://support.apple.com/kb/HT213843 https://support.apple.com/kb/HT213844
-
Azul Zulu: CVE-2023-22045: Vulnerability in the Hotspot component
Azul Zulu: CVE-2023-22045: Vulnerability in the Hotspot component Severity 4 CVSS (AV:N/AC:M/Au:N/C:P/I:N/A:N) Published 07/25/2023 Created 07/25/2023 Added 07/25/2023 Modified 01/28/2025 Description Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot).Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK.Successful attacks of this vulnerability can result inunauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Confidentiality impacts).CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). Solution(s) azul-zulu-upgrade-latest References https://attackerkb.com/topics/cve-2023-22045 CVE - 2023-22045 https://www.azul.com/downloads/
-
Azul Zulu: CVE-2023-22043: Vulnerability in the JavaFX component
Azul Zulu: CVE-2023-22043: Vulnerability in the JavaFX component Severity 7 CVSS (AV:N/AC:M/Au:N/C:N/I:C/A:N) Published 07/25/2023 Created 07/25/2023 Added 07/25/2023 Modified 01/28/2025 Description Vulnerability in Oracle Java SE (component: JavaFX). The supported version that is affected is Oracle Java SE: 8u371. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE.Successful attacks of this vulnerability can result inunauthorized creation, deletion or modification access to critical data or all Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.9 (Integrity impacts).CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N). Solution(s) azul-zulu-upgrade-latest References https://attackerkb.com/topics/cve-2023-22043 CVE - 2023-22043 https://www.azul.com/downloads/
-
Aruba AOS-10: CVE-2023-35982: Unauthenticated Buffer Overflow Vulnerabilities in Services Accessed by the PAPI Protocol
Aruba AOS-10: CVE-2023-35982: Unauthenticated Buffer Overflow Vulnerabilities in Services Accessed by the PAPI Protocol Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 07/25/2023 Created 01/16/2025 Added 01/14/2025 Modified 02/04/2025 Description There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. Solution(s) aruba-aos-10-cve-2023-35982 References https://attackerkb.com/topics/cve-2023-35982 CVE - 2023-35982 https://csaf.arubanetworks.com/2023/hpe_aruba_networking_-_2023-009.json
-
Aruba AOS-10: CVE-2023-35981: Unauthenticated Buffer Overflow Vulnerabilities in Services Accessed by the PAPI Protocol
Aruba AOS-10: CVE-2023-35981: Unauthenticated Buffer Overflow Vulnerabilities in Services Accessed by the PAPI Protocol Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 07/25/2023 Created 01/16/2025 Added 01/14/2025 Modified 02/04/2025 Description There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. Solution(s) aruba-aos-10-cve-2023-35981 References https://attackerkb.com/topics/cve-2023-35981 CVE - 2023-35981 https://csaf.arubanetworks.com/2023/hpe_aruba_networking_-_2023-009.json
-
Aruba AOS-10: CVE-2023-35980: Unauthenticated Buffer Overflow Vulnerabilities in Services Accessed by the PAPI Protocol
Aruba AOS-10: CVE-2023-35980: Unauthenticated Buffer Overflow Vulnerabilities in Services Accessed by the PAPI Protocol Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 07/25/2023 Created 01/16/2025 Added 01/14/2025 Modified 02/04/2025 Description There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. Solution(s) aruba-aos-10-cve-2023-35980 References https://attackerkb.com/topics/cve-2023-35980 CVE - 2023-35980 https://csaf.arubanetworks.com/2023/hpe_aruba_networking_-_2023-009.json
-
VMware Photon OS: CVE-2023-3772
VMware Photon OS: CVE-2023-3772 Severity 5 CVSS (AV:L/AC:L/Au:S/C:N/I:N/A:C) Published 07/25/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-3772 CVE - 2023-3772
-
VMware Photon OS: CVE-2023-3750
VMware Photon OS: CVE-2023-3750 Severity 7 CVSS (AV:N/AC:L/Au:S/C:N/I:N/A:C) Published 07/24/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description A flaw was found in libvirt. The virStoragePoolObjListSearch function does not return a locked pool as expected, resulting in a race condition and denial of service when attempting to lock the same object from another thread. This issue could allow clients connecting to the read-only socket to crash the libvirt daemon. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-3750 CVE - 2023-3750
-
Amazon Linux AMI: CVE-2023-3567: Security patch for kernel (ALAS-2023-1897)
Amazon Linux AMI: CVE-2023-3567: Security patch for kernel (ALAS-2023-1897) Severity 6 CVSS (AV:L/AC:L/Au:S/C:C/I:N/A:C) Published 07/24/2023 Created 12/07/2023 Added 12/05/2023 Modified 01/28/2025 Description A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information. Solution(s) amazon-linux-upgrade-kernel References ALAS-2023-1897 CVE-2023-3567
-
VMware Photon OS: CVE-2023-3567
VMware Photon OS: CVE-2023-3567 Severity 6 CVSS (AV:L/AC:L/Au:S/C:C/I:N/A:C) Published 07/24/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-3567 CVE - 2023-3567
-
VMware Photon OS: CVE-2023-32247
VMware Photon OS: CVE-2023-32247 Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 07/24/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-32247 CVE - 2023-32247
-
VMware Photon OS: CVE-2023-2860
VMware Photon OS: CVE-2023-2860 Severity 4 CVSS (AV:L/AC:L/Au:M/C:C/I:N/A:N) Published 07/24/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-2860 CVE - 2023-2860
-
CentOS Linux: CVE-2023-3750: Moderate: libvirt security, bug fix, and enhancement update (CESA-2023:6409)
CentOS Linux: CVE-2023-3750: Moderate: libvirt security, bug fix, and enhancement update (CESA-2023:6409) Severity 6 CVSS (AV:N/AC:M/Au:S/C:N/I:N/A:C) Published 07/24/2023 Created 11/09/2023 Added 11/08/2023 Modified 01/28/2025 Description A flaw was found in libvirt. The virStoragePoolObjListSearch function does not return a locked pool as expected, resulting in a race condition and denial of service when attempting to lock the same object from another thread. This issue could allow clients connecting to the read-only socket to crash the libvirt daemon. Solution(s) centos-upgrade-libvirt centos-upgrade-libvirt-client centos-upgrade-libvirt-client-debuginfo centos-upgrade-libvirt-daemon centos-upgrade-libvirt-daemon-common centos-upgrade-libvirt-daemon-common-debuginfo centos-upgrade-libvirt-daemon-config-network centos-upgrade-libvirt-daemon-config-nwfilter centos-upgrade-libvirt-daemon-debuginfo centos-upgrade-libvirt-daemon-driver-interface centos-upgrade-libvirt-daemon-driver-interface-debuginfo centos-upgrade-libvirt-daemon-driver-network centos-upgrade-libvirt-daemon-driver-network-debuginfo centos-upgrade-libvirt-daemon-driver-nodedev centos-upgrade-libvirt-daemon-driver-nodedev-debuginfo centos-upgrade-libvirt-daemon-driver-nwfilter centos-upgrade-libvirt-daemon-driver-nwfilter-debuginfo centos-upgrade-libvirt-daemon-driver-qemu centos-upgrade-libvirt-daemon-driver-qemu-debuginfo centos-upgrade-libvirt-daemon-driver-secret centos-upgrade-libvirt-daemon-driver-secret-debuginfo centos-upgrade-libvirt-daemon-driver-storage centos-upgrade-libvirt-daemon-driver-storage-core centos-upgrade-libvirt-daemon-driver-storage-core-debuginfo centos-upgrade-libvirt-daemon-driver-storage-disk centos-upgrade-libvirt-daemon-driver-storage-disk-debuginfo centos-upgrade-libvirt-daemon-driver-storage-iscsi centos-upgrade-libvirt-daemon-driver-storage-iscsi-debuginfo centos-upgrade-libvirt-daemon-driver-storage-logical centos-upgrade-libvirt-daemon-driver-storage-logical-debuginfo centos-upgrade-libvirt-daemon-driver-storage-mpath centos-upgrade-libvirt-daemon-driver-storage-mpath-debuginfo centos-upgrade-libvirt-daemon-driver-storage-rbd centos-upgrade-libvirt-daemon-driver-storage-rbd-debuginfo centos-upgrade-libvirt-daemon-driver-storage-scsi centos-upgrade-libvirt-daemon-driver-storage-scsi-debuginfo centos-upgrade-libvirt-daemon-kvm centos-upgrade-libvirt-daemon-lock centos-upgrade-libvirt-daemon-lock-debuginfo centos-upgrade-libvirt-daemon-log centos-upgrade-libvirt-daemon-log-debuginfo centos-upgrade-libvirt-daemon-plugin-lockd centos-upgrade-libvirt-daemon-plugin-lockd-debuginfo centos-upgrade-libvirt-daemon-plugin-sanlock-debuginfo centos-upgrade-libvirt-daemon-proxy centos-upgrade-libvirt-daemon-proxy-debuginfo centos-upgrade-libvirt-debuginfo centos-upgrade-libvirt-debugsource centos-upgrade-libvirt-libs centos-upgrade-libvirt-libs-debuginfo centos-upgrade-libvirt-nss centos-upgrade-libvirt-nss-debuginfo centos-upgrade-libvirt-wireshark-debuginfo References CVE-2023-3750
-
CentOS Linux: CVE-2023-38200: Moderate: keylime security update (CESA-2023:5080)
CentOS Linux: CVE-2023-38200: Moderate: keylime security update (CESA-2023:5080) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 07/24/2023 Created 09/13/2023 Added 09/13/2023 Modified 01/28/2025 Description A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections. Solution(s) centos-upgrade-keylime centos-upgrade-keylime-base centos-upgrade-keylime-registrar centos-upgrade-keylime-selinux centos-upgrade-keylime-tenant centos-upgrade-keylime-verifier centos-upgrade-python3-keylime References CVE-2023-38200
-
CentOS Linux: CVE-2023-20593: Important: kernel security and bug fix update (Multiple Advisories)
CentOS Linux: CVE-2023-20593: Important: kernel security and bug fix update (Multiple Advisories) Severity 5 CVSS (AV:L/AC:L/Au:S/C:C/I:N/A:N) Published 07/24/2023 Created 08/30/2023 Added 08/30/2023 Modified 01/28/2025 Description An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information. Solution(s) centos-upgrade-iwl100-firmware centos-upgrade-iwl1000-firmware centos-upgrade-iwl105-firmware centos-upgrade-iwl135-firmware centos-upgrade-iwl2000-firmware centos-upgrade-iwl2030-firmware centos-upgrade-iwl3160-firmware centos-upgrade-iwl3945-firmware centos-upgrade-iwl4965-firmware centos-upgrade-iwl5000-firmware centos-upgrade-iwl5150-firmware centos-upgrade-iwl6000-firmware centos-upgrade-iwl6000g2a-firmware centos-upgrade-iwl6000g2b-firmware centos-upgrade-iwl6050-firmware centos-upgrade-iwl7260-firmware centos-upgrade-kernel centos-upgrade-kernel-rt centos-upgrade-linux-firmware References CVE-2023-20593
-
VMware Photon OS: CVE-2023-33952
VMware Photon OS: CVE-2023-33952 Severity 6 CVSS (AV:L/AC:L/Au:M/C:C/I:C/A:C) Published 07/24/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-33952 CVE - 2023-33952
-
VMware Photon OS: CVE-2023-32252
VMware Photon OS: CVE-2023-32252 Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 07/24/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-32252 CVE - 2023-32252
-
Debian: CVE-2023-20593: amd64-microcode, linux -- security update
Debian: CVE-2023-20593: amd64-microcode, linux -- security update Severity 5 CVSS (AV:L/AC:L/Au:S/C:C/I:N/A:N) Published 07/24/2023 Created 07/27/2023 Added 07/27/2023 Modified 01/28/2025 Description An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information. Solution(s) debian-upgrade-amd64-microcode debian-upgrade-linux References https://attackerkb.com/topics/cve-2023-20593 CVE - 2023-20593 DSA-5459-1
-
Debian: CVE-2023-3727: chromium -- security update
Debian: CVE-2023-3727: chromium -- security update Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 07/24/2023 Created 07/25/2023 Added 07/24/2023 Modified 01/28/2025 Description Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Solution(s) debian-upgrade-chromium References https://attackerkb.com/topics/cve-2023-3727 CVE - 2023-3727 DSA-5456-1
-
Debian: CVE-2023-32257: linux -- security update
Debian: CVE-2023-32257: linux -- security update Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 07/24/2023 Created 07/31/2024 Added 07/30/2024 Modified 01/30/2025 Description A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel. Solution(s) debian-upgrade-linux References https://attackerkb.com/topics/cve-2023-32257 CVE - 2023-32257
-
Debian: CVE-2023-2860: linux -- security update
Debian: CVE-2023-2860: linux -- security update Severity 4 CVSS (AV:L/AC:L/Au:M/C:C/I:N/A:N) Published 07/24/2023 Created 07/31/2024 Added 07/30/2024 Modified 01/28/2025 Description An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel. Solution(s) debian-upgrade-linux References https://attackerkb.com/topics/cve-2023-2860 CVE - 2023-2860
-
Debian: CVE-2023-3745: imagemagick -- security update
Debian: CVE-2023-3745: imagemagick -- security update Severity 5 CVSS (AV:L/AC:M/Au:N/C:N/I:N/A:C) Published 07/24/2023 Created 07/31/2024 Added 07/30/2024 Modified 01/30/2025 Description A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service. Solution(s) debian-upgrade-imagemagick References https://attackerkb.com/topics/cve-2023-3745 CVE - 2023-3745