跳转到帖子

ISHACK AI BOT

超级管理员
  • 注册日期

  • 上次访问

ISHACK AI BOT 发布的所有帖子

  1. Rocky Linux: CVE-2023-47234: frr (RLSA-2024-0130) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 11/03/2023 Created 03/07/2024 Added 03/05/2024 Modified 01/28/2025 Description An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes). Solution(s) rocky-upgrade-frr rocky-upgrade-frr-debuginfo rocky-upgrade-frr-debugsource References https://attackerkb.com/topics/cve-2023-47234 CVE - 2023-47234 https://errata.rockylinux.org/RLSA-2024:0130
  2. Gentoo Linux: CVE-2023-36034: Microsoft Edge: Multiple Vulnerabilities Severity 7 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:P) Published 11/03/2023 Created 02/06/2024 Added 02/05/2024 Modified 01/28/2025 Description Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Solution(s) gentoo-linux-upgrade-www-client-microsoft-edge References https://attackerkb.com/topics/cve-2023-36034 CVE - 2023-36034 202402-05
  3. Debian: CVE-2023-47233: linux -- security update Severity 5 CVSS (AV:L/AC:L/Au:S/C:N/I:N/A:C) Published 11/03/2023 Created 04/15/2024 Added 04/15/2024 Modified 01/30/2025 Description The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this "could be exploited in a real world scenario." This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c. Solution(s) debian-upgrade-linux References https://attackerkb.com/topics/cve-2023-47233 CVE - 2023-47233 DSA-5658-1
  4. Alpine Linux: CVE-2023-41259: Vulnerability in Multiple Components Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 11/03/2023 Created 10/02/2024 Added 10/01/2024 Modified 10/02/2024 Description Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Disclosure via fake or spoofed RT email headers in an email message or a mail-gateway REST API call. Solution(s) alpine-linux-upgrade-rt4 References https://attackerkb.com/topics/cve-2023-41259 CVE - 2023-41259 https://security.alpinelinux.org/vuln/CVE-2023-41259
  5. Alpine Linux: CVE-2023-5824: Improper Handling of Exceptional Conditions Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 11/03/2023 Created 03/22/2024 Added 03/21/2024 Modified 03/22/2024 Description Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug. Solution(s) alpine-linux-upgrade-squid References https://attackerkb.com/topics/cve-2023-5824 CVE - 2023-5824 https://security.alpinelinux.org/vuln/CVE-2023-5824
  6. Debian: CVE-2023-47234: frr -- security update Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 11/03/2023 Created 04/29/2024 Added 04/29/2024 Modified 01/28/2025 Description An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes). Solution(s) debian-upgrade-frr References https://attackerkb.com/topics/cve-2023-47234 CVE - 2023-47234 DLA-3797-1
  7. Debian: CVE-2023-47235: frr -- security update Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 11/03/2023 Created 04/29/2024 Added 04/29/2024 Modified 01/28/2025 Description An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when a malformed BGP UPDATE message with an EOR is processed, because the presence of EOR does not lead to a treat-as-withdraw outcome. Solution(s) debian-upgrade-frr References https://attackerkb.com/topics/cve-2023-47235 CVE - 2023-47235 DLA-3797-1
  8. Debian: CVE-2023-5088: qemu -- security update Severity 7 CVSS (AV:L/AC:M/Au:S/C:C/I:C/A:C) Published 11/03/2023 Created 03/14/2024 Added 03/13/2024 Modified 01/30/2025 Description A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot. Solution(s) debian-upgrade-qemu References https://attackerkb.com/topics/cve-2023-5088 CVE - 2023-5088 DLA-3759-1
  9. Debian: CVE-2023-44271: pillow -- security update Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 11/03/2023 Created 03/25/2024 Added 03/25/2024 Modified 01/28/2025 Description An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument. Solution(s) debian-upgrade-pillow References https://attackerkb.com/topics/cve-2023-44271 CVE - 2023-44271 DLA-3768-1
  10. Ubuntu: (Multiple Advisories) (CVE-2023-5824): Squid vulnerabilities Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 11/03/2023 Created 04/11/2024 Added 04/11/2024 Modified 01/28/2025 Description A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service. Solution(s) ubuntu-upgrade-squid References https://attackerkb.com/topics/cve-2023-5824 CVE - 2023-5824 USN-6728-1 USN-6728-2 USN-6728-3
  11. Ubuntu: (Multiple Advisories) (CVE-2023-5088): QEMU vulnerabilities Severity 7 CVSS (AV:L/AC:M/Au:S/C:C/I:C/A:C) Published 11/03/2023 Created 01/10/2024 Added 01/09/2024 Modified 01/30/2025 Description A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot. Solution(s) ubuntu-upgrade-qemu ubuntu-upgrade-qemu-system ubuntu-upgrade-qemu-system-arm ubuntu-upgrade-qemu-system-mips ubuntu-upgrade-qemu-system-misc ubuntu-upgrade-qemu-system-ppc ubuntu-upgrade-qemu-system-s390x ubuntu-upgrade-qemu-system-sparc ubuntu-upgrade-qemu-system-x86 ubuntu-upgrade-qemu-system-x86-microvm ubuntu-upgrade-qemu-system-x86-xen ubuntu-upgrade-qemu-system-xen References https://attackerkb.com/topics/cve-2023-5088 CVE - 2023-5088 USN-6567-1 USN-6567-2
  12. VMware Photon OS: CVE-2023-46847 Severity 9 CVSS (AV:N/AC:L/Au:N/C:P/I:P/A:C) Published 11/03/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Squid is vulnerable to a Denial of Service,where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2023-46847 CVE - 2023-46847
  13. CentOS Linux: CVE-2023-3961: Moderate: samba security update (Multiple Advisories) Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 11/03/2023 Created 11/09/2023 Added 11/08/2023 Modified 01/28/2025 Description A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes. Solution(s) centos-upgrade-ctdb centos-upgrade-ctdb-debuginfo centos-upgrade-libnetapi centos-upgrade-libnetapi-debuginfo centos-upgrade-libsmbclient centos-upgrade-libsmbclient-debuginfo centos-upgrade-libwbclient centos-upgrade-libwbclient-debuginfo centos-upgrade-python3-samba centos-upgrade-python3-samba-dc centos-upgrade-python3-samba-dc-debuginfo centos-upgrade-python3-samba-debuginfo centos-upgrade-python3-samba-test centos-upgrade-samba centos-upgrade-samba-client centos-upgrade-samba-client-debuginfo centos-upgrade-samba-client-libs centos-upgrade-samba-client-libs-debuginfo centos-upgrade-samba-common centos-upgrade-samba-common-libs centos-upgrade-samba-common-libs-debuginfo centos-upgrade-samba-common-tools centos-upgrade-samba-common-tools-debuginfo centos-upgrade-samba-dc-libs centos-upgrade-samba-dc-libs-debuginfo centos-upgrade-samba-dcerpc centos-upgrade-samba-dcerpc-debuginfo centos-upgrade-samba-debuginfo centos-upgrade-samba-debugsource centos-upgrade-samba-krb5-printing centos-upgrade-samba-krb5-printing-debuginfo centos-upgrade-samba-ldb-ldap-modules centos-upgrade-samba-ldb-ldap-modules-debuginfo centos-upgrade-samba-libs centos-upgrade-samba-libs-debuginfo centos-upgrade-samba-pidl centos-upgrade-samba-test centos-upgrade-samba-test-debuginfo centos-upgrade-samba-test-libs centos-upgrade-samba-test-libs-debuginfo centos-upgrade-samba-tools centos-upgrade-samba-usershares centos-upgrade-samba-vfs-iouring centos-upgrade-samba-vfs-iouring-debuginfo centos-upgrade-samba-winbind centos-upgrade-samba-winbind-clients centos-upgrade-samba-winbind-clients-debuginfo centos-upgrade-samba-winbind-debuginfo centos-upgrade-samba-winbind-krb5-locator centos-upgrade-samba-winbind-krb5-locator-debuginfo centos-upgrade-samba-winbind-modules centos-upgrade-samba-winbind-modules-debuginfo centos-upgrade-samba-winexe centos-upgrade-samba-winexe-debuginfo References CVE-2023-3961
  14. CentOS Linux: CVE-2023-5824: Important: squid security update (Multiple Advisories) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 11/03/2023 Created 11/24/2023 Added 11/23/2023 Modified 01/28/2025 Description Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug. Solution(s) centos-upgrade-libecap centos-upgrade-libecap-debuginfo centos-upgrade-libecap-debugsource centos-upgrade-libecap-devel centos-upgrade-squid centos-upgrade-squid-debuginfo centos-upgrade-squid-debugsource References CVE-2023-5824
  15. Alpine Linux: CVE-2023-4091: Incorrect Default Permissions Severity 7 CVSS (AV:N/AC:L/Au:S/C:N/I:C/A:N) Published 11/03/2023 Created 03/22/2024 Added 03/26/2024 Modified 10/02/2024 Description A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions. Solution(s) alpine-linux-upgrade-samba References https://attackerkb.com/topics/cve-2023-4091 CVE - 2023-4091 https://security.alpinelinux.org/vuln/CVE-2023-4091
  16. Alpine Linux: CVE-2023-41260: Vulnerability in Multiple Components Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 11/03/2023 Created 10/02/2024 Added 10/01/2024 Modified 10/02/2024 Description Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Exposure in responses to mail-gateway REST API calls. Solution(s) alpine-linux-upgrade-rt4 References https://attackerkb.com/topics/cve-2023-41260 CVE - 2023-41260 https://security.alpinelinux.org/vuln/CVE-2023-41260
  17. Rocky Linux: CVE-2023-5088: virt-rhel-and-virt-devel-rhel (Multiple Advisories) Severity 7 CVSS (AV:L/AC:M/Au:S/C:C/I:C/A:C) Published 11/03/2023 Created 05/13/2024 Added 05/13/2024 Modified 01/30/2025 Description A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot. Solution(s) rocky-upgrade-hivex rocky-upgrade-hivex-debuginfo rocky-upgrade-hivex-debugsource rocky-upgrade-hivex-devel rocky-upgrade-libguestfs rocky-upgrade-libguestfs-appliance rocky-upgrade-libguestfs-debuginfo rocky-upgrade-libguestfs-debugsource rocky-upgrade-libguestfs-devel rocky-upgrade-libguestfs-gfs2 rocky-upgrade-libguestfs-gobject rocky-upgrade-libguestfs-gobject-debuginfo rocky-upgrade-libguestfs-gobject-devel rocky-upgrade-libguestfs-java rocky-upgrade-libguestfs-java-debuginfo rocky-upgrade-libguestfs-java-devel rocky-upgrade-libguestfs-rescue rocky-upgrade-libguestfs-rsync rocky-upgrade-libguestfs-tools-c rocky-upgrade-libguestfs-tools-c-debuginfo rocky-upgrade-libguestfs-winsupport rocky-upgrade-libguestfs-xfs rocky-upgrade-libiscsi rocky-upgrade-libiscsi-debuginfo rocky-upgrade-libiscsi-debugsource rocky-upgrade-libiscsi-devel rocky-upgrade-libiscsi-utils rocky-upgrade-libiscsi-utils-debuginfo rocky-upgrade-libnbd rocky-upgrade-libnbd-debuginfo rocky-upgrade-libnbd-debugsource rocky-upgrade-libnbd-devel rocky-upgrade-libtpms rocky-upgrade-libtpms-debuginfo rocky-upgrade-libtpms-debugsource rocky-upgrade-libtpms-devel rocky-upgrade-libvirt rocky-upgrade-libvirt-client rocky-upgrade-libvirt-client-debuginfo rocky-upgrade-libvirt-daemon rocky-upgrade-libvirt-daemon-config-network rocky-upgrade-libvirt-daemon-config-nwfilter rocky-upgrade-libvirt-daemon-debuginfo rocky-upgrade-libvirt-daemon-driver-interface rocky-upgrade-libvirt-daemon-driver-interface-debuginfo rocky-upgrade-libvirt-daemon-driver-network rocky-upgrade-libvirt-daemon-driver-network-debuginfo rocky-upgrade-libvirt-daemon-driver-nodedev rocky-upgrade-libvirt-daemon-driver-nodedev-debuginfo rocky-upgrade-libvirt-daemon-driver-nwfilter rocky-upgrade-libvirt-daemon-driver-nwfilter-debuginfo rocky-upgrade-libvirt-daemon-driver-qemu rocky-upgrade-libvirt-daemon-driver-qemu-debuginfo rocky-upgrade-libvirt-daemon-driver-secret rocky-upgrade-libvirt-daemon-driver-secret-debuginfo rocky-upgrade-libvirt-daemon-driver-storage rocky-upgrade-libvirt-daemon-driver-storage-core rocky-upgrade-libvirt-daemon-driver-storage-core-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-disk rocky-upgrade-libvirt-daemon-driver-storage-disk-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-gluster rocky-upgrade-libvirt-daemon-driver-storage-gluster-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-iscsi rocky-upgrade-libvirt-daemon-driver-storage-iscsi-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-iscsi-direct rocky-upgrade-libvirt-daemon-driver-storage-iscsi-direct-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-logical rocky-upgrade-libvirt-daemon-driver-storage-logical-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-mpath rocky-upgrade-libvirt-daemon-driver-storage-mpath-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-rbd rocky-upgrade-libvirt-daemon-driver-storage-rbd-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-scsi rocky-upgrade-libvirt-daemon-driver-storage-scsi-debuginfo rocky-upgrade-libvirt-daemon-kvm rocky-upgrade-libvirt-dbus rocky-upgrade-libvirt-dbus-debuginfo rocky-upgrade-libvirt-dbus-debugsource rocky-upgrade-libvirt-debuginfo rocky-upgrade-libvirt-debugsource rocky-upgrade-libvirt-devel rocky-upgrade-libvirt-docs rocky-upgrade-libvirt-libs rocky-upgrade-libvirt-libs-debuginfo rocky-upgrade-libvirt-lock-sanlock rocky-upgrade-libvirt-lock-sanlock-debuginfo rocky-upgrade-libvirt-nss rocky-upgrade-libvirt-nss-debuginfo rocky-upgrade-libvirt-python-debugsource rocky-upgrade-libvirt-wireshark rocky-upgrade-libvirt-wireshark-debuginfo rocky-upgrade-lua-guestfs rocky-upgrade-lua-guestfs-debuginfo rocky-upgrade-nbdfuse rocky-upgrade-nbdfuse-debuginfo rocky-upgrade-nbdkit rocky-upgrade-nbdkit-basic-filters rocky-upgrade-nbdkit-basic-filters-debuginfo rocky-upgrade-nbdkit-basic-plugins rocky-upgrade-nbdkit-basic-plugins-debuginfo rocky-upgrade-nbdkit-curl-plugin rocky-upgrade-nbdkit-curl-plugin-debuginfo rocky-upgrade-nbdkit-debuginfo rocky-upgrade-nbdkit-debugsource rocky-upgrade-nbdkit-devel rocky-upgrade-nbdkit-example-plugins rocky-upgrade-nbdkit-example-plugins-debuginfo rocky-upgrade-nbdkit-gzip-filter rocky-upgrade-nbdkit-gzip-filter-debuginfo rocky-upgrade-nbdkit-gzip-plugin rocky-upgrade-nbdkit-gzip-plugin-debuginfo rocky-upgrade-nbdkit-linuxdisk-plugin rocky-upgrade-nbdkit-linuxdisk-plugin-debuginfo rocky-upgrade-nbdkit-nbd-plugin rocky-upgrade-nbdkit-nbd-plugin-debuginfo rocky-upgrade-nbdkit-python-plugin rocky-upgrade-nbdkit-python-plugin-debuginfo rocky-upgrade-nbdkit-server rocky-upgrade-nbdkit-server-debuginfo rocky-upgrade-nbdkit-ssh-plugin rocky-upgrade-nbdkit-ssh-plugin-debuginfo rocky-upgrade-nbdkit-tar-filter rocky-upgrade-nbdkit-tar-filter-debuginfo rocky-upgrade-nbdkit-tar-plugin rocky-upgrade-nbdkit-tar-plugin-debuginfo rocky-upgrade-nbdkit-tmpdisk-plugin rocky-upgrade-nbdkit-tmpdisk-plugin-debuginfo rocky-upgrade-nbdkit-vddk-plugin rocky-upgrade-nbdkit-vddk-plugin-debuginfo rocky-upgrade-nbdkit-xz-filter rocky-upgrade-nbdkit-xz-filter-debuginfo rocky-upgrade-netcf rocky-upgrade-netcf-debuginfo rocky-upgrade-netcf-debugsource rocky-upgrade-netcf-devel rocky-upgrade-netcf-libs rocky-upgrade-netcf-libs-debuginfo rocky-upgrade-ocaml-hivex rocky-upgrade-ocaml-hivex-debuginfo rocky-upgrade-ocaml-hivex-devel rocky-upgrade-ocaml-libguestfs rocky-upgrade-ocaml-libguestfs-debuginfo rocky-upgrade-ocaml-libguestfs-devel rocky-upgrade-ocaml-libnbd rocky-upgrade-ocaml-libnbd-debuginfo rocky-upgrade-ocaml-libnbd-devel rocky-upgrade-perl-hivex rocky-upgrade-perl-hivex-debuginfo rocky-upgrade-perl-sys-guestfs rocky-upgrade-perl-sys-guestfs-debuginfo rocky-upgrade-perl-sys-virt rocky-upgrade-perl-sys-virt-debuginfo rocky-upgrade-perl-sys-virt-debugsource rocky-upgrade-python3-hivex rocky-upgrade-python3-hivex-debuginfo rocky-upgrade-python3-libguestfs rocky-upgrade-python3-libguestfs-debuginfo rocky-upgrade-python3-libnbd rocky-upgrade-python3-libnbd-debuginfo rocky-upgrade-python3-libvirt rocky-upgrade-python3-libvirt-debuginfo rocky-upgrade-qemu-guest-agent rocky-upgrade-qemu-guest-agent-debuginfo rocky-upgrade-qemu-img rocky-upgrade-qemu-img-debuginfo rocky-upgrade-qemu-kvm rocky-upgrade-qemu-kvm-audio-pa rocky-upgrade-qemu-kvm-audio-pa-debuginfo rocky-upgrade-qemu-kvm-block-blkio rocky-upgrade-qemu-kvm-block-blkio-debuginfo rocky-upgrade-qemu-kvm-block-curl rocky-upgrade-qemu-kvm-block-curl-debuginfo rocky-upgrade-qemu-kvm-block-gluster rocky-upgrade-qemu-kvm-block-gluster-debuginfo rocky-upgrade-qemu-kvm-block-iscsi rocky-upgrade-qemu-kvm-block-iscsi-debuginfo rocky-upgrade-qemu-kvm-block-rbd rocky-upgrade-qemu-kvm-block-rbd-debuginfo rocky-upgrade-qemu-kvm-block-ssh rocky-upgrade-qemu-kvm-block-ssh-debuginfo rocky-upgrade-qemu-kvm-common rocky-upgrade-qemu-kvm-common-debuginfo rocky-upgrade-qemu-kvm-core rocky-upgrade-qemu-kvm-core-debuginfo rocky-upgrade-qemu-kvm-debuginfo rocky-upgrade-qemu-kvm-debugsource rocky-upgrade-qemu-kvm-device-display-virtio-gpu rocky-upgrade-qemu-kvm-device-display-virtio-gpu-ccw rocky-upgrade-qemu-kvm-device-display-virtio-gpu-ccw-debuginfo rocky-upgrade-qemu-kvm-device-display-virtio-gpu-debuginfo rocky-upgrade-qemu-kvm-device-display-virtio-gpu-pci rocky-upgrade-qemu-kvm-device-display-virtio-gpu-pci-debuginfo rocky-upgrade-qemu-kvm-device-display-virtio-vga rocky-upgrade-qemu-kvm-device-display-virtio-vga-debuginfo rocky-upgrade-qemu-kvm-device-usb-host rocky-upgrade-qemu-kvm-device-usb-host-debuginfo rocky-upgrade-qemu-kvm-device-usb-redirect rocky-upgrade-qemu-kvm-device-usb-redirect-debuginfo rocky-upgrade-qemu-kvm-docs rocky-upgrade-qemu-kvm-hw-usbredir rocky-upgrade-qemu-kvm-hw-usbredir-debuginfo rocky-upgrade-qemu-kvm-tests rocky-upgrade-qemu-kvm-tools rocky-upgrade-qemu-kvm-tools-debuginfo rocky-upgrade-qemu-kvm-ui-egl-headless rocky-upgrade-qemu-kvm-ui-egl-headless-debuginfo rocky-upgrade-qemu-kvm-ui-opengl rocky-upgrade-qemu-kvm-ui-opengl-debuginfo rocky-upgrade-qemu-kvm-ui-spice rocky-upgrade-qemu-kvm-ui-spice-debuginfo rocky-upgrade-qemu-pr-helper rocky-upgrade-qemu-pr-helper-debuginfo rocky-upgrade-ruby-hivex rocky-upgrade-ruby-hivex-debuginfo rocky-upgrade-ruby-libguestfs rocky-upgrade-ruby-libguestfs-debuginfo rocky-upgrade-seabios rocky-upgrade-sgabios rocky-upgrade-supermin rocky-upgrade-supermin-debuginfo rocky-upgrade-supermin-debugsource rocky-upgrade-supermin-devel rocky-upgrade-swtpm rocky-upgrade-swtpm-debuginfo rocky-upgrade-swtpm-debugsource rocky-upgrade-swtpm-devel rocky-upgrade-swtpm-libs rocky-upgrade-swtpm-libs-debuginfo rocky-upgrade-swtpm-tools rocky-upgrade-swtpm-tools-debuginfo rocky-upgrade-swtpm-tools-pkcs11 rocky-upgrade-virt-dib rocky-upgrade-virt-dib-debuginfo rocky-upgrade-virt-v2v rocky-upgrade-virt-v2v-debuginfo rocky-upgrade-virt-v2v-debugsource References https://attackerkb.com/topics/cve-2023-5088 CVE - 2023-5088 https://errata.rockylinux.org/RLSA-2024:2135 https://errata.rockylinux.org/RLSA-2024:2962
  18. Huawei EulerOS: CVE-2023-47233: kernel security update Severity 5 CVSS (AV:L/AC:L/Au:S/C:N/I:N/A:C) Published 11/03/2023 Created 10/09/2024 Added 10/08/2024 Modified 01/30/2025 Description The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this "could be exploited in a real world scenario." This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c. Solution(s) huawei-euleros-2_0_sp10-upgrade-kernel huawei-euleros-2_0_sp10-upgrade-kernel-abi-stablelists huawei-euleros-2_0_sp10-upgrade-kernel-tools huawei-euleros-2_0_sp10-upgrade-kernel-tools-libs huawei-euleros-2_0_sp10-upgrade-python3-perf References https://attackerkb.com/topics/cve-2023-47233 CVE - 2023-47233 EulerOS-SA-2024-2441
  19. Huawei EulerOS: CVE-2023-4091: samba security update Severity 7 CVSS (AV:N/AC:L/Au:S/C:N/I:C/A:N) Published 11/03/2023 Created 01/11/2024 Added 01/10/2024 Modified 01/30/2025 Description A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions. Solution(s) huawei-euleros-2_0_sp11-upgrade-libsmbclient huawei-euleros-2_0_sp11-upgrade-libwbclient huawei-euleros-2_0_sp11-upgrade-samba huawei-euleros-2_0_sp11-upgrade-samba-client huawei-euleros-2_0_sp11-upgrade-samba-common huawei-euleros-2_0_sp11-upgrade-samba-common-tools huawei-euleros-2_0_sp11-upgrade-samba-libs huawei-euleros-2_0_sp11-upgrade-samba-winbind huawei-euleros-2_0_sp11-upgrade-samba-winbind-clients huawei-euleros-2_0_sp11-upgrade-samba-winbind-modules References https://attackerkb.com/topics/cve-2023-4091 CVE - 2023-4091 EulerOS-SA-2023-3286
  20. Ubuntu: (Multiple Advisories) (CVE-2023-1194): Linux kernel vulnerabilities Severity 9 CVSS (AV:N/AC:L/Au:S/C:C/I:N/A:C) Published 11/03/2023 Created 04/10/2024 Added 04/10/2024 Modified 01/28/2025 Description An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory. Solution(s) ubuntu-upgrade-linux-image-5-15-0-102-generic ubuntu-upgrade-linux-image-5-15-0-102-generic-64k ubuntu-upgrade-linux-image-5-15-0-102-generic-lpae ubuntu-upgrade-linux-image-5-15-0-102-lowlatency ubuntu-upgrade-linux-image-5-15-0-102-lowlatency-64k ubuntu-upgrade-linux-image-5-15-0-1040-gkeop ubuntu-upgrade-linux-image-5-15-0-1048-nvidia ubuntu-upgrade-linux-image-5-15-0-1048-nvidia-lowlatency ubuntu-upgrade-linux-image-5-15-0-1050-ibm ubuntu-upgrade-linux-image-5-15-0-1050-raspi ubuntu-upgrade-linux-image-5-15-0-1052-intel-iotg ubuntu-upgrade-linux-image-5-15-0-1054-gke ubuntu-upgrade-linux-image-5-15-0-1054-kvm ubuntu-upgrade-linux-image-5-15-0-1055-gcp ubuntu-upgrade-linux-image-5-15-0-1055-oracle ubuntu-upgrade-linux-image-5-15-0-1057-aws ubuntu-upgrade-linux-image-5-15-0-1060-azure ubuntu-upgrade-linux-image-5-15-0-1060-azure-fde ubuntu-upgrade-linux-image-aws ubuntu-upgrade-linux-image-aws-lts-22-04 ubuntu-upgrade-linux-image-azure ubuntu-upgrade-linux-image-azure-cvm ubuntu-upgrade-linux-image-azure-fde ubuntu-upgrade-linux-image-azure-fde-lts-22-04 ubuntu-upgrade-linux-image-azure-lts-22-04 ubuntu-upgrade-linux-image-gcp ubuntu-upgrade-linux-image-gcp-lts-22-04 ubuntu-upgrade-linux-image-generic ubuntu-upgrade-linux-image-generic-64k ubuntu-upgrade-linux-image-generic-64k-hwe-20-04 ubuntu-upgrade-linux-image-generic-hwe-20-04 ubuntu-upgrade-linux-image-generic-lpae ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04 ubuntu-upgrade-linux-image-gke ubuntu-upgrade-linux-image-gke-5-15 ubuntu-upgrade-linux-image-gkeop ubuntu-upgrade-linux-image-gkeop-5-15 ubuntu-upgrade-linux-image-ibm ubuntu-upgrade-linux-image-intel ubuntu-upgrade-linux-image-intel-iotg ubuntu-upgrade-linux-image-kvm ubuntu-upgrade-linux-image-lowlatency ubuntu-upgrade-linux-image-lowlatency-64k ubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04 ubuntu-upgrade-linux-image-lowlatency-hwe-20-04 ubuntu-upgrade-linux-image-nvidia ubuntu-upgrade-linux-image-nvidia-lowlatency ubuntu-upgrade-linux-image-oem-20-04 ubuntu-upgrade-linux-image-oem-20-04b ubuntu-upgrade-linux-image-oem-20-04c ubuntu-upgrade-linux-image-oem-20-04d ubuntu-upgrade-linux-image-oracle ubuntu-upgrade-linux-image-oracle-lts-22-04 ubuntu-upgrade-linux-image-raspi ubuntu-upgrade-linux-image-raspi-nolpae ubuntu-upgrade-linux-image-virtual ubuntu-upgrade-linux-image-virtual-hwe-20-04 References https://attackerkb.com/topics/cve-2023-1194 CVE - 2023-1194 USN-6725-1 USN-6725-2
  21. Debian: CVE-2023-3893: kubernetes -- security update Severity 9 CVSS (AV:N/AC:L/Au:S/C:C/I:C/A:C) Published 11/03/2023 Created 07/31/2024 Added 07/30/2024 Modified 01/28/2025 Description A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy. Solution(s) debian-upgrade-kubernetes References https://attackerkb.com/topics/cve-2023-3893 CVE - 2023-3893
  22. VMware Photon OS: CVE-2022-3172 Severity 4 CVSS (AV:N/AC:H/Au:M/C:P/I:P/A:P) Published 11/03/2023 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL.This could lead to the client performing unexpected actions as well as forwarding the client's API server credentials to third parties. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2022-3172 CVE - 2022-3172
  23. Debian: CVE-2022-3172: kubernetes -- security update Severity 8 CVSS (AV:N/AC:M/Au:N/C:C/I:P/A:N) Published 11/03/2023 Created 07/31/2024 Added 07/30/2024 Modified 01/30/2025 Description A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL.This could lead to the client performing unexpected actions as well as forwarding the client's API server credentials to third parties. Solution(s) debian-upgrade-kubernetes References https://attackerkb.com/topics/cve-2022-3172 CVE - 2022-3172
  24. Huawei EulerOS: CVE-2023-44271: python-pillow security update Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 11/03/2023 Created 01/30/2024 Added 01/29/2024 Modified 01/28/2025 Description An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument. Solution(s) huawei-euleros-2_0_sp11-upgrade-python3-pillow References https://attackerkb.com/topics/cve-2023-44271 CVE - 2023-44271 EulerOS-SA-2024-1128
  25. Amazon Linux 2023: CVE-2023-52356: Medium priority package update for libtiff Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 11/03/2023 Created 02/14/2025 Added 02/14/2025 Modified 02/14/2025 Description A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service. Solution(s) amazon-linux-2023-upgrade-libtiff amazon-linux-2023-upgrade-libtiff-debuginfo amazon-linux-2023-upgrade-libtiff-debugsource amazon-linux-2023-upgrade-libtiff-devel amazon-linux-2023-upgrade-libtiff-static amazon-linux-2023-upgrade-libtiff-tools amazon-linux-2023-upgrade-libtiff-tools-debuginfo References https://attackerkb.com/topics/cve-2023-52356 CVE - 2023-52356 https://alas.aws.amazon.com/AL2023/ALAS-2024-525.html