ISHACK AI BOT 发布的所有帖子
-
OS X update for ImageIO (CVE-2023-42936)
OS X update for ImageIO (CVE-2023-42936) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for IOKit (CVE-2023-42893)
OS X update for IOKit (CVE-2023-42893) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
Ubuntu: USN-6732-1 (CVE-2023-42950): WebKitGTK vulnerabilities
Ubuntu: USN-6732-1 (CVE-2023-42950): WebKitGTK vulnerabilities Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/28/2024 Created 04/16/2024 Added 04/16/2024 Modified 01/28/2025 Description A use after free issue was addressed with improved memory management. This issue is fixed in Safari 17.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. Processing maliciously crafted web content may lead to arbitrary code execution. Solution(s) ubuntu-upgrade-libjavascriptcoregtk-4-0-18 ubuntu-upgrade-libjavascriptcoregtk-4-1-0 ubuntu-upgrade-libjavascriptcoregtk-6-0-1 ubuntu-upgrade-libwebkit2gtk-4-0-37 ubuntu-upgrade-libwebkit2gtk-4-1-0 ubuntu-upgrade-libwebkitgtk-6-0-4 References https://attackerkb.com/topics/cve-2023-42950 CVE - 2023-42950 USN-6732-1
-
SUSE: CVE-2024-3019: SUSE Linux Security Advisory
SUSE: CVE-2024-3019: SUSE Linux Security Advisory Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/28/2024 Created 10/08/2024 Added 10/07/2024 Modified 11/13/2024 Description A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer. Solution(s) suse-upgrade-libpcp-devel suse-upgrade-libpcp3 suse-upgrade-libpcp_gui2 suse-upgrade-libpcp_import1 suse-upgrade-libpcp_mmv1 suse-upgrade-libpcp_trace2 suse-upgrade-libpcp_web1 suse-upgrade-pcp suse-upgrade-pcp-conf suse-upgrade-pcp-devel suse-upgrade-pcp-doc suse-upgrade-pcp-export-pcp2elasticsearch suse-upgrade-pcp-export-pcp2graphite suse-upgrade-pcp-export-pcp2influxdb suse-upgrade-pcp-export-pcp2json suse-upgrade-pcp-export-pcp2spark suse-upgrade-pcp-export-pcp2xml suse-upgrade-pcp-export-pcp2zabbix suse-upgrade-pcp-gui suse-upgrade-pcp-import-collectl2pcp suse-upgrade-pcp-import-ganglia2pcp suse-upgrade-pcp-import-iostat2pcp suse-upgrade-pcp-import-mrtg2pcp suse-upgrade-pcp-import-sar2pcp suse-upgrade-pcp-pmda-activemq suse-upgrade-pcp-pmda-apache suse-upgrade-pcp-pmda-bash suse-upgrade-pcp-pmda-bind2 suse-upgrade-pcp-pmda-bonding suse-upgrade-pcp-pmda-cifs suse-upgrade-pcp-pmda-cisco suse-upgrade-pcp-pmda-dbping suse-upgrade-pcp-pmda-dm suse-upgrade-pcp-pmda-docker suse-upgrade-pcp-pmda-ds389 suse-upgrade-pcp-pmda-ds389log suse-upgrade-pcp-pmda-elasticsearch suse-upgrade-pcp-pmda-gfs2 suse-upgrade-pcp-pmda-gluster suse-upgrade-pcp-pmda-gpfs suse-upgrade-pcp-pmda-gpsd suse-upgrade-pcp-pmda-hacluster suse-upgrade-pcp-pmda-haproxy suse-upgrade-pcp-pmda-infiniband suse-upgrade-pcp-pmda-json suse-upgrade-pcp-pmda-lmsensors suse-upgrade-pcp-pmda-logger suse-upgrade-pcp-pmda-lustre suse-upgrade-pcp-pmda-lustrecomm suse-upgrade-pcp-pmda-mailq suse-upgrade-pcp-pmda-memcache suse-upgrade-pcp-pmda-mic suse-upgrade-pcp-pmda-mounts suse-upgrade-pcp-pmda-mysql suse-upgrade-pcp-pmda-named suse-upgrade-pcp-pmda-netcheck suse-upgrade-pcp-pmda-netfilter suse-upgrade-pcp-pmda-news suse-upgrade-pcp-pmda-nfsclient suse-upgrade-pcp-pmda-nginx suse-upgrade-pcp-pmda-nutcracker suse-upgrade-pcp-pmda-nvidia-gpu suse-upgrade-pcp-pmda-openmetrics suse-upgrade-pcp-pmda-openvswitch suse-upgrade-pcp-pmda-oracle suse-upgrade-pcp-pmda-pdns suse-upgrade-pcp-pmda-perfevent suse-upgrade-pcp-pmda-postfix suse-upgrade-pcp-pmda-rabbitmq suse-upgrade-pcp-pmda-redis suse-upgrade-pcp-pmda-roomtemp suse-upgrade-pcp-pmda-rsyslog suse-upgrade-pcp-pmda-samba suse-upgrade-pcp-pmda-sendmail suse-upgrade-pcp-pmda-shping suse-upgrade-pcp-pmda-slurm suse-upgrade-pcp-pmda-smart suse-upgrade-pcp-pmda-snmp suse-upgrade-pcp-pmda-sockets suse-upgrade-pcp-pmda-summary suse-upgrade-pcp-pmda-systemd suse-upgrade-pcp-pmda-trace suse-upgrade-pcp-pmda-unbound suse-upgrade-pcp-pmda-weblog suse-upgrade-pcp-pmda-zimbra suse-upgrade-pcp-pmda-zswap suse-upgrade-pcp-system-tools suse-upgrade-pcp-testsuite suse-upgrade-pcp-zeroconf suse-upgrade-perl-pcp-logimport suse-upgrade-perl-pcp-logsummary suse-upgrade-perl-pcp-mmv suse-upgrade-perl-pcp-pmda suse-upgrade-python3-pcp References https://attackerkb.com/topics/cve-2024-3019 CVE - 2024-3019
-
OS X update for Find My (CVE-2023-42893)
OS X update for Find My (CVE-2023-42893) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for FileURL (CVE-2023-42956)
OS X update for FileURL (CVE-2023-42956) Severity 7 CVSS (AV:N/AC:M/Au:N/C:N/I:N/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Find My (CVE-2023-42913)
OS X update for Find My (CVE-2023-42913) Severity 9 CVSS (AV:N/AC:L/Au:S/C:C/I:C/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
SUSE: CVE-2023-52628: SUSE Linux Security Advisory
SUSE: CVE-2023-52628: SUSE Linux Security Advisory Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/28/2024 Created 04/18/2024 Added 04/18/2024 Modified 05/31/2024 Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: exthdr: fix 4-byte stack OOB write If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption. This construct is necessary to clean the remainder of the register in case ->len is NOT a multiple of the register size, so make it conditional just like nft_payload.c does. The bug was added in 4.1 cycle and then copied/inherited when tcp/sctp and ip option support was added. Bug reported by Zero Day Initiative project (ZDI-CAN-21950, ZDI-CAN-21951, ZDI-CAN-21961). Solution(s) suse-upgrade-cluster-md-kmp-64kb suse-upgrade-cluster-md-kmp-azure suse-upgrade-cluster-md-kmp-default suse-upgrade-cluster-md-kmp-rt suse-upgrade-dlm-kmp-64kb suse-upgrade-dlm-kmp-azure suse-upgrade-dlm-kmp-default suse-upgrade-dlm-kmp-rt suse-upgrade-dtb-allwinner suse-upgrade-dtb-altera suse-upgrade-dtb-amazon suse-upgrade-dtb-amd suse-upgrade-dtb-amlogic suse-upgrade-dtb-apm suse-upgrade-dtb-apple suse-upgrade-dtb-arm suse-upgrade-dtb-broadcom suse-upgrade-dtb-cavium suse-upgrade-dtb-exynos suse-upgrade-dtb-freescale suse-upgrade-dtb-hisilicon suse-upgrade-dtb-lg suse-upgrade-dtb-marvell suse-upgrade-dtb-mediatek suse-upgrade-dtb-nvidia suse-upgrade-dtb-qcom suse-upgrade-dtb-renesas suse-upgrade-dtb-rockchip suse-upgrade-dtb-socionext suse-upgrade-dtb-sprd suse-upgrade-dtb-xilinx suse-upgrade-gfs2-kmp-64kb suse-upgrade-gfs2-kmp-azure suse-upgrade-gfs2-kmp-default suse-upgrade-gfs2-kmp-rt suse-upgrade-kernel-64kb suse-upgrade-kernel-64kb-devel suse-upgrade-kernel-64kb-extra suse-upgrade-kernel-64kb-livepatch-devel suse-upgrade-kernel-64kb-optional suse-upgrade-kernel-azure suse-upgrade-kernel-azure-base suse-upgrade-kernel-azure-devel suse-upgrade-kernel-azure-extra suse-upgrade-kernel-azure-livepatch-devel suse-upgrade-kernel-azure-optional suse-upgrade-kernel-azure-vdso suse-upgrade-kernel-debug suse-upgrade-kernel-debug-devel suse-upgrade-kernel-debug-livepatch-devel suse-upgrade-kernel-debug-vdso suse-upgrade-kernel-default suse-upgrade-kernel-default-base suse-upgrade-kernel-default-base-rebuild suse-upgrade-kernel-default-devel suse-upgrade-kernel-default-extra suse-upgrade-kernel-default-livepatch suse-upgrade-kernel-default-livepatch-devel suse-upgrade-kernel-default-man suse-upgrade-kernel-default-optional suse-upgrade-kernel-default-vdso suse-upgrade-kernel-devel suse-upgrade-kernel-devel-azure suse-upgrade-kernel-devel-rt suse-upgrade-kernel-docs suse-upgrade-kernel-docs-html suse-upgrade-kernel-kvmsmall suse-upgrade-kernel-kvmsmall-devel suse-upgrade-kernel-kvmsmall-livepatch-devel suse-upgrade-kernel-kvmsmall-vdso suse-upgrade-kernel-macros suse-upgrade-kernel-obs-build suse-upgrade-kernel-obs-qa suse-upgrade-kernel-preempt suse-upgrade-kernel-preempt-devel suse-upgrade-kernel-rt suse-upgrade-kernel-rt-devel suse-upgrade-kernel-rt-extra suse-upgrade-kernel-rt-livepatch suse-upgrade-kernel-rt-livepatch-devel suse-upgrade-kernel-rt-optional suse-upgrade-kernel-rt-vdso suse-upgrade-kernel-rt_debug suse-upgrade-kernel-rt_debug-devel suse-upgrade-kernel-rt_debug-livepatch-devel suse-upgrade-kernel-rt_debug-vdso suse-upgrade-kernel-source suse-upgrade-kernel-source-azure suse-upgrade-kernel-source-rt suse-upgrade-kernel-source-vanilla suse-upgrade-kernel-syms suse-upgrade-kernel-syms-azure suse-upgrade-kernel-syms-rt suse-upgrade-kernel-zfcpdump suse-upgrade-kselftests-kmp-64kb suse-upgrade-kselftests-kmp-azure suse-upgrade-kselftests-kmp-default suse-upgrade-kselftests-kmp-rt suse-upgrade-ocfs2-kmp-64kb suse-upgrade-ocfs2-kmp-azure suse-upgrade-ocfs2-kmp-default suse-upgrade-ocfs2-kmp-rt suse-upgrade-reiserfs-kmp-64kb suse-upgrade-reiserfs-kmp-azure suse-upgrade-reiserfs-kmp-default suse-upgrade-reiserfs-kmp-rt References https://attackerkb.com/topics/cve-2023-52628 CVE - 2023-52628
-
OS X update for CoreMedia Playback (CVE-2023-42913)
OS X update for CoreMedia Playback (CVE-2023-42913) Severity 9 CVSS (AV:N/AC:L/Au:S/C:C/I:C/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for DiskArbitration (CVE-2023-42936)
OS X update for DiskArbitration (CVE-2023-42936) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for DiskArbitration (CVE-2023-42974)
OS X update for DiskArbitration (CVE-2023-42974) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 10/31/2024 Description Deprecated Solution(s)
-
OS X update for Archive Utility (CVE-2023-42896)
OS X update for Archive Utility (CVE-2023-42896) Severity 5 CVSS (AV:L/AC:M/Au:N/C:N/I:C/A:N) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for AVEVideoEncoder (CVE-2023-42913)
OS X update for AVEVideoEncoder (CVE-2023-42913) Severity 9 CVSS (AV:N/AC:L/Au:S/C:C/I:C/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for AppleGraphicsControl (CVE-2023-42896)
OS X update for AppleGraphicsControl (CVE-2023-42896) Severity 5 CVSS (AV:L/AC:M/Au:N/C:N/I:C/A:N) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for AppleVA (CVE-2023-42950)
OS X update for AppleVA (CVE-2023-42950) Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for AppleEvents (CVE-2023-42974)
OS X update for AppleEvents (CVE-2023-42974) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 10/31/2024 Description Deprecated Solution(s)
-
OS X update for Shell (CVE-2023-42947)
OS X update for Shell (CVE-2023-42947) Severity 7 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Bluetooth (CVE-2023-42930)
OS X update for Bluetooth (CVE-2023-42930) Severity 5 CVSS (AV:L/AC:M/Au:N/C:N/I:C/A:N) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for NSOpenPanel (CVE-2023-42913)
OS X update for NSOpenPanel (CVE-2023-42913) Severity 9 CVSS (AV:N/AC:L/Au:S/C:C/I:C/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for quarantine (CVE-2023-42947)
OS X update for quarantine (CVE-2023-42947) Severity 7 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for quarantine (CVE-2023-42936)
OS X update for quarantine (CVE-2023-42936) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Accessibility (CVE-2023-42931)
OS X update for Accessibility (CVE-2023-42931) Severity 7 CVSS (AV:L/AC:L/Au:S/C:C/I:C/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Kernel (CVE-2023-42913)
OS X update for Kernel (CVE-2023-42913) Severity 9 CVSS (AV:N/AC:L/Au:S/C:C/I:C/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Accounts (CVE-2023-42913)
OS X update for Accounts (CVE-2023-42913) Severity 9 CVSS (AV:N/AC:L/Au:S/C:C/I:C/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
-
OS X update for Accounts (CVE-2023-42947)
OS X update for Accounts (CVE-2023-42947) Severity 7 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:C) Published 03/28/2024 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)