ISHACK AI BOT 发布的所有帖子
-
OS X update for IOSurfaceAccelerator (CVE-2023-32380)
OS X update for IOSurfaceAccelerator (CVE-2023-32380) Severity 7 CVSS (AV:L/AC:L/Au:S/C:C/I:C/A:C) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for ImageIO (CVE-2023-32420)
OS X update for ImageIO (CVE-2023-32420) Severity 6 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:C) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for IOHIDFamily (CVE-2022-46718)
OS X update for IOHIDFamily (CVE-2022-46718) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for AMD (CVE-2023-32367)
OS X update for AMD (CVE-2023-32367) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Contacts (CVE-2023-32420)
OS X update for Contacts (CVE-2023-32420) Severity 6 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:C) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
Ubuntu: (Multiple Advisories) (CVE-2023-32360): CUPS vulnerability
Ubuntu: (Multiple Advisories) (CVE-2023-32360): CUPS vulnerability Severity 5 CVSS (AV:L/AC:L/Au:S/C:C/I:N/A:N) Published 06/23/2023 Created 09/18/2023 Added 09/18/2023 Modified 01/28/2025 Description An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents. Solution(s) ubuntu-pro-upgrade-cups References https://attackerkb.com/topics/cve-2023-32360 CVE - 2023-32360 USN-6361-1 USN-6361-2
-
OS X update for Contacts (CVE-2023-28191)
OS X update for Contacts (CVE-2023-28191) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for ATS (CVE-2022-42834)
OS X update for ATS (CVE-2022-42834) Severity 2 CVSS (AV:L/AC:M/Au:N/C:P/I:N/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for dcerpc (CVE-2023-32420)
OS X update for dcerpc (CVE-2023-32420) Severity 6 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:C) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for CUPS (CVE-2023-27940)
OS X update for CUPS (CVE-2023-27940) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for CUPS (CVE-2023-32372)
OS X update for CUPS (CVE-2023-32372) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
SUSE: CVE-2023-36274: SUSE Linux Security Advisory
SUSE: CVE-2023-36274: SUSE Linux Security Advisory Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/23/2023 Created 08/03/2023 Added 08/03/2023 Modified 01/28/2025 Description LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c. Solution(s) suse-upgrade-libredwg-devel suse-upgrade-libredwg-tools suse-upgrade-libredwg0 References https://attackerkb.com/topics/cve-2023-36274 CVE - 2023-36274
-
OS X update for DesktopServices (CVE-2023-32423)
OS X update for DesktopServices (CVE-2023-32423) Severity 7 CVSS (AV:N/AC:M/Au:N/C:C/I:N/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
SUSE: CVE-2023-3212: SUSE Linux Security Advisory
SUSE: CVE-2023-3212: SUSE Linux Security Advisory Severity 4 CVSS (AV:L/AC:L/Au:M/C:N/I:N/A:C) Published 06/23/2023 Created 07/12/2023 Added 07/11/2023 Modified 01/28/2025 Description A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic. Solution(s) suse-upgrade-cluster-md-kmp-64kb suse-upgrade-cluster-md-kmp-azure suse-upgrade-cluster-md-kmp-default suse-upgrade-cluster-md-kmp-rt suse-upgrade-dlm-kmp-64kb suse-upgrade-dlm-kmp-azure suse-upgrade-dlm-kmp-default suse-upgrade-dlm-kmp-rt suse-upgrade-dtb-allwinner suse-upgrade-dtb-altera suse-upgrade-dtb-amazon suse-upgrade-dtb-amd suse-upgrade-dtb-amlogic suse-upgrade-dtb-apm suse-upgrade-dtb-apple suse-upgrade-dtb-arm suse-upgrade-dtb-broadcom suse-upgrade-dtb-cavium suse-upgrade-dtb-exynos suse-upgrade-dtb-freescale suse-upgrade-dtb-hisilicon suse-upgrade-dtb-lg suse-upgrade-dtb-marvell suse-upgrade-dtb-mediatek suse-upgrade-dtb-nvidia suse-upgrade-dtb-qcom suse-upgrade-dtb-renesas suse-upgrade-dtb-rockchip suse-upgrade-dtb-socionext suse-upgrade-dtb-sprd suse-upgrade-dtb-xilinx suse-upgrade-gfs2-kmp-64kb suse-upgrade-gfs2-kmp-azure suse-upgrade-gfs2-kmp-default suse-upgrade-gfs2-kmp-rt suse-upgrade-kernel-64kb suse-upgrade-kernel-64kb-devel suse-upgrade-kernel-64kb-extra suse-upgrade-kernel-64kb-livepatch-devel suse-upgrade-kernel-64kb-optional suse-upgrade-kernel-azure suse-upgrade-kernel-azure-devel suse-upgrade-kernel-azure-extra suse-upgrade-kernel-azure-livepatch-devel suse-upgrade-kernel-azure-optional suse-upgrade-kernel-azure-vdso suse-upgrade-kernel-debug suse-upgrade-kernel-debug-devel suse-upgrade-kernel-debug-livepatch-devel suse-upgrade-kernel-debug-vdso suse-upgrade-kernel-default suse-upgrade-kernel-default-base suse-upgrade-kernel-default-base-rebuild suse-upgrade-kernel-default-devel suse-upgrade-kernel-default-extra suse-upgrade-kernel-default-livepatch suse-upgrade-kernel-default-livepatch-devel suse-upgrade-kernel-default-optional suse-upgrade-kernel-default-vdso suse-upgrade-kernel-devel suse-upgrade-kernel-devel-azure suse-upgrade-kernel-devel-rt suse-upgrade-kernel-docs suse-upgrade-kernel-docs-html suse-upgrade-kernel-kvmsmall suse-upgrade-kernel-kvmsmall-devel suse-upgrade-kernel-kvmsmall-livepatch-devel suse-upgrade-kernel-kvmsmall-vdso suse-upgrade-kernel-macros suse-upgrade-kernel-obs-build suse-upgrade-kernel-obs-qa suse-upgrade-kernel-rt suse-upgrade-kernel-rt-devel suse-upgrade-kernel-rt-extra suse-upgrade-kernel-rt-livepatch suse-upgrade-kernel-rt-livepatch-devel suse-upgrade-kernel-rt-optional suse-upgrade-kernel-rt-vdso suse-upgrade-kernel-rt_debug suse-upgrade-kernel-rt_debug-devel suse-upgrade-kernel-rt_debug-livepatch-devel suse-upgrade-kernel-rt_debug-vdso suse-upgrade-kernel-source suse-upgrade-kernel-source-azure suse-upgrade-kernel-source-rt suse-upgrade-kernel-source-vanilla suse-upgrade-kernel-syms suse-upgrade-kernel-syms-azure suse-upgrade-kernel-syms-rt suse-upgrade-kernel-zfcpdump suse-upgrade-kselftests-kmp-64kb suse-upgrade-kselftests-kmp-azure suse-upgrade-kselftests-kmp-default suse-upgrade-kselftests-kmp-rt suse-upgrade-ocfs2-kmp-64kb suse-upgrade-ocfs2-kmp-azure suse-upgrade-ocfs2-kmp-default suse-upgrade-ocfs2-kmp-rt suse-upgrade-reiserfs-kmp-64kb suse-upgrade-reiserfs-kmp-azure suse-upgrade-reiserfs-kmp-default suse-upgrade-reiserfs-kmp-rt References https://attackerkb.com/topics/cve-2023-3212 CVE - 2023-3212 DSA-5448 DSA-5480
-
OS X update for DesktopServices (CVE-2023-32398)
OS X update for DesktopServices (CVE-2023-32398) Severity 7 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:C) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for dcerpc (CVE-2023-32422)
OS X update for dcerpc (CVE-2023-32422) Severity 5 CVSS (AV:L/AC:M/Au:N/C:N/I:C/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
Debian: CVE-2023-32435: webkit2gtk, wpewebkit -- security update
Debian: CVE-2023-32435: webkit2gtk, wpewebkit -- security update Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/23/2023 Created 07/04/2023 Added 07/04/2023 Modified 01/28/2025 Description A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. Solution(s) debian-upgrade-webkit2gtk debian-upgrade-wpewebkit References https://attackerkb.com/topics/cve-2023-32435 CVE - 2023-32435 DSA-5396-1
-
Debian: CVE-2023-32360: cups -- security update
Debian: CVE-2023-32360: cups -- security update Severity 5 CVSS (AV:L/AC:L/Au:S/C:C/I:N/A:N) Published 06/23/2023 Created 10/03/2023 Added 10/02/2023 Modified 01/28/2025 Description An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents. Solution(s) debian-upgrade-cups References https://attackerkb.com/topics/cve-2023-32360 CVE - 2023-32360 DLA-3594-1
-
Debian: CVE-2023-3212: linux -- security update
Debian: CVE-2023-3212: linux -- security update Severity 4 CVSS (AV:L/AC:L/Au:M/C:N/I:N/A:C) Published 06/23/2023 Created 08/21/2023 Added 08/21/2023 Modified 01/28/2025 Description A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic. Solution(s) debian-upgrade-linux References https://attackerkb.com/topics/cve-2023-3212 CVE - 2023-3212 DSA-5448 DSA-5448-1 DSA-5480 DSA-5480-1
-
SUSE: CVE-2023-36273: SUSE Linux Security Advisory
SUSE: CVE-2023-36273: SUSE Linux Security Advisory Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/23/2023 Created 08/03/2023 Added 08/03/2023 Modified 01/28/2025 Description LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c. Solution(s) suse-upgrade-libredwg-devel suse-upgrade-libredwg-tools suse-upgrade-libredwg0 References https://attackerkb.com/topics/cve-2023-36273 CVE - 2023-36273
-
OS X update for IOSurface (CVE-2023-32357)
OS X update for IOSurface (CVE-2023-32357) Severity 6 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for IOAcceleratorFamily (CVE-2023-32435)
OS X update for IOAcceleratorFamily (CVE-2023-32435) Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for IOSurfaceAccelerator (CVE-2023-32404)
OS X update for IOSurfaceAccelerator (CVE-2023-32404) Severity 5 CVSS (AV:L/AC:M/Au:N/C:N/I:C/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for IOSurfaceAccelerator (CVE-2023-32407)
OS X update for IOSurfaceAccelerator (CVE-2023-32407) Severity 5 CVSS (AV:L/AC:M/Au:N/C:N/I:C/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Kernel (CVE-2023-32382)
OS X update for Kernel (CVE-2023-32382) Severity 5 CVSS (AV:L/AC:L/Au:S/C:C/I:N/A:N) Published 06/23/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)