Latest linux linux kernel Vulnerabilities

Certain WithSecure products allow a Denial of Service because scanning a crafted file takes a long time, and causes the scanner to hang. This affects WithSecure Client Security 15, WithSecure Server S...
F-secure Linux Protection=12.0
F-secure Linux Security 64=12.0
Linux Linux kernel
F-Secure Atlant=1.0.35-1
F-Secure Client Security=15.00
F-secure Elements Endpoint Protection>=17.0
and 4 more
Certain WithSecure products allow a Denial of Service because there is an unpack handler crash that can lead to a scanning engine crash. This affects WithSecure Client Security 15, WithSecure Server S...
F-secure Linux Protection=12.0
F-secure Linux Security 64=12.0
Linux Linux kernel
F-Secure Atlant=1.0.35-1
F-Secure Client Security=15.00
F-secure Elements Endpoint Protection>=17.0
and 4 more
Kernel: nvme: memory corruption via unprivileged user passthrough
Linux Linux kernel
Fedoraproject Fedora=38
IBM InfoSphere Information Server privilege escalation
Ibm Infosphere Information Server<=11.7
Ibm Infosphere Information Server=11.7
IBM AIX
Linux Linux kernel
Microsoft Windows
Certain WithSecure products allow a Denial of Service (DoS) in the antivirus engine when scanning a fuzzed PE32 file. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSec...
WithSecure Client Security=15
WithSecure Elements Endpoint Protection>=17
WithSecure Email and Server Security=15
WithSecure Server Security=15
Microsoft Windows
Apple macOS
and 4 more
Certain WithSecure products have a buffer over-read whereby processing certain fuzz file types may cause a denial of service (DoS). This affects WithSecure Client Security 15, WithSecure Server Securi...
WithSecure Client Security=15
WithSecure Elements Endpoint Protection>=17
WithSecure Email and Server Security=15
WithSecure Server Security=15
Microsoft Windows
Apple macOS
and 5 more
ManageEngine Information Disclosure in Multiple Products
Zoho ManageEngine<5.3
Zohocorp Manageengine Appcreator<2.0.0
Zohocorp Manageengine Application Control Plus<11.2.2328.01
Zohocorp Manageengine Browser Security Plus<11.2.2328.01
Zoho ManageEngine<11.2.2328.01
Zohocorp Manageengine Endpoint Central<11.2.2322.01
and 713 more
A logged in user can modify specific files that may lead to unauthorized changes in system-wide configuration settings. This vulnerability could be exploited to compromise the integrity and security o...
Ivanti Secure Access Client=22.2-r1
Ivanti Secure Access Client=22.3-r1
Ivanti Secure Access Client=22.3-r2
Ivanti Secure Access Client=22.3-r3
Linux Linux kernel
Uncontrolled resource consumption in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access.
Intel Aptio V Uefi Firmware Integrator Tools=5.27.03.0003
Microsoft Windows
Intel Aptio V Uefi Firmware Integrator Tools=5.27.06.0017
Linux Linux kernel
Exposure of sensitive information to an unauthorized actor in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable information disclosure via loc...
Intel Aptio V Uefi Firmware Integrator Tools=5.27.03.0003
Microsoft Windows
Intel Aptio V Uefi Firmware Integrator Tools=5.27.06.0017
Linux Linux kernel
Integer overflow in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access.
Intel Aptio V Uefi Firmware Integrator Tools=5.27.03.0003
Microsoft Windows
Intel Aptio V Uefi Firmware Integrator Tools=5.27.06.0017
Linux Linux kernel
Use after free in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allowed an authenticated user to potentially enable denial of service via local access.
Intel Aptio V Uefi Firmware Integrator Tools=5.27.03.0003
Microsoft Windows
Intel Aptio V Uefi Firmware Integrator Tools=5.27.06.0017
Linux Linux kernel
Race condition in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access.
Intel Aptio V Uefi Firmware Integrator Tools=5.27.03.0003
Microsoft Windows
Intel Aptio V Uefi Firmware Integrator Tools=5.27.06.0017
Linux Linux kernel
Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmi Windows 5.27.03.0003 may allow a privileged user to potentially enable escalation of privilege via ...
Intel Aptio V Uefi Firmware Integrator Tools=5.27.03.0003
Microsoft Windows
Intel Aptio V Uefi Firmware Integrator Tools=5.27.06.0017
Linux Linux kernel
Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated to potentially enable escalation of privileges via local access.
Intel Aptio V Uefi Firmware Integrator Tools=5.27.03.0003
Microsoft Windows
Intel Aptio V Uefi Firmware Integrator Tools=5.27.06.0017
Linux Linux kernel
Improper initialization in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel Aptio V Uefi Firmware Integrator Tools=5.27.03.0003
Microsoft Windows
Intel Aptio V Uefi Firmware Integrator Tools=5.27.06.0017
Linux Linux kernel
Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmiEdit-Linux-5.27.06.0017 may allow a privileged user to potentially enable escalation of privilege vi...
Intel Aptio V Uefi Firmware Integrator Tools=5.27.03.0003
Microsoft Windows
Intel Aptio V Uefi Firmware Integrator Tools=5.27.06.0017
Linux Linux kernel
Use-after-free in Linux kernel's netfilter: nf_tables component
Linux Linux kernel>=6.6<6.7
Kernel: use-after-free in drivers/net/usb/lan78xx.c in lan78xx_disconnect
redhat/Kernel<6.5
Linux Linux kernel<6.5
Linux Linux kernel=6.5-rc1
Linux Linux kernel=6.5-rc2
Linux Linux kernel=6.5-rc3
Linux Linux kernel=6.5-rc4
Cortex XSOAR: Local Privilege Escalation (PE) Vulnerability in Cortex XSOAR Engine
Paloaltonetworks Cortex Xsoar<6.10.0
Linux Linux kernel
IBM CICS TX information disclosure
IBM CICS TX Advanced<=10.1
IBM CICS TX=10.1
Linux Linux kernel
Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c
Linux Linux kernel>=6.2.1<=6.5.10
Linux Linux kernel=6.2-rc1
Linux Linux kernel=6.2-rc2
Linux Linux kernel=6.2-rc3
Linux Linux kernel=6.2-rc4
Linux Linux kernel=6.2-rc5
and 16 more
Kernel: kvm: svm: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs
Linux Linux kernel<=6.5
Linux Linux kernel=6.6-rc1
Linux Linux kernel=6.6-rc2
Linux Linux kernel=6.6-rc3
Linux Linux kernel=6.6-rc4
Linux Linux kernel=6.6-rc5
and 80 more
7-Zip 7Z File Parsing Integer Underflow Remote Code Execution Vulnerability
7-Zip 7-Zip
7-Zip 7-Zip<22.01
Linux Linux kernel
Apple watchOS
NetApp OnCommand Workflow Automation
IBM CICS TX Advanced cross-site scripting
IBM CICS TX Advanced<=10.1
IBM CICS TX=10.1
Linux Linux kernel
IBM CICS TX Advanced information disclosure
IBM CICS TX Advanced<=10.1
IBM CICS TX=10.1
Linux Linux kernel
The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers ...
Linux Linux kernel<=6.5.10
NVIDIA Virtual GPU<13.9
NVIDIA Virtual GPU>=14.0<15.4
NVIDIA Virtual GPU>=16.0<16.2
Microsoft Azure Stack Hci
Canonical Ubuntu Linux
Citrix Hypervisor
and 5 more
NVIDIA Virtual GPU<13.9
NVIDIA Virtual GPU>=14.0<15.4
NVIDIA Virtual GPU>=16.0<16.2
Microsoft Azure Stack Hci
Canonical Ubuntu Linux
Citrix Hypervisor
and 5 more
Under certain conditions, a low privileged attacker could load a specially crafted file during installation or upgrade to escalate privileges on Windows and Linux hosts.
Tenable Nessus<10.6.2
Tenable Nessus Agent<10.4.3
Linux Linux kernel
Microsoft Windows
IBM Content Navigator server-side request forgery
IBM Content Navigator<=3.0.14
IBM Content Navigator<=3.0.13
IBM Content Navigator<=3.0.11
IBM Content Navigator=3.0.13
Linux Linux kernel
Microsoft Windows
IBM CICS TX privilege escalation
IBM CICS TX Advanced<=10.1
IBM CICS TX Advanced<=11.1
IBM CICS TX Standard<=11.1
IBM CICS TX=10.1
IBM CICS TX=11.1
IBM CICS TX=11.1
and 1 more
IBM CICS TX cross-site request forgery
IBM TXSeries for Multiplatforms<=8.1
IBM TXSeries for Multiplatforms<=8.2
IBM TXSeries for Multiplatforms<=9.1
IBM TXSeries for Multiplatforms=8.1
IBM TXSeries for Multiplatforms=9.1
IBM AIX
and 7 more
IBM CICS TX cross-site scripting
IBM CICS TX Advanced<=10.1
IBM CICS TX Advanced<=11.1
IBM CICS TX Standard<=11.1
IBM TXSeries for Multiplatforms=8.1
IBM TXSeries for Multiplatforms=8.2
IBM TXSeries for Multiplatforms=9.1
and 7 more
tinyfiledialogs (aka tiny file dialogs) before 3.8.0 allows shell metacharacters in titles, messages, and other input data.
Vareille Tinyfiledialogs<3.8.0
Linux Linux kernel
tinyfiledialogs (aka tiny file dialogs) before 3.15.0 allows shell metacharacters (such as a backquote or a dollar sign) in titles, messages, and other input data. NOTE: this issue exists because of a...
Vareille Tiny File Dialogs<3.15.0
Linux Linux kernel
An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.
Linux Linux kernel<=6.5.9
An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of ...
Linux Linux kernel<6.5.9
A vulnerability in the ClearPass OnGuard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role. A successful exploit allows malicious u...
Arubanetworks Clearpass Policy Manager<6.9.13
Arubanetworks Clearpass Policy Manager>=6.10.0<6.10.8
Arubanetworks Clearpass Policy Manager>=6.11.0<=6.11.4
Arubanetworks Clearpass Policy Manager=6.9.13
Arubanetworks Clearpass Policy Manager=6.9.13-cumulative_hotfix_patch_2
Arubanetworks Clearpass Policy Manager=6.9.13-cumulative_hotfix_patch_3
and 4 more
Out-of-bounds write in Linux kernel's Linux Kernel Performance Events (perf) component
Linux Linux kernel>=4.4<6.6
Linux Linux kernel=6.6-rc1
Linux Linux kernel=6.6-rc2
Linux Linux kernel=6.6-rc3
Linux Linux kernel=6.6-rc4
Linux Linux kernel=6.6-rc5
and 63 more
Kernel: vmwgfx: reference count issue leads to use-after-free in surface handling
Linux Linux kernel<6.6
Linux Linux kernel=6.6-rc1
Linux Linux kernel=6.6-rc2
Linux Linux kernel=6.6-rc3
Linux Linux kernel=6.6-rc4
Linux Linux kernel=6.6-rc5
and 65 more
IBM CICS TX could allow a privileged user to cause a denial of service due to uncontrolled resource consumption.
IBM CICS TX Advanced<=10.1, 11.1
IBM CICS TX Standard<=11.1
IBM TXSeries for Multiplatforms=8.1
IBM TXSeries for Multiplatforms=8.2
IBM TXSeries for Multiplatforms=9.1
IBM AIX
and 4 more
IBM Db2 denial of service
Ibm Db2>=11.5<=11.5.8
Ibm Db2=10.5
Ibm Db2=10.5-fp1
Ibm Db2=10.5-fp10
Ibm Db2=10.5-fp2
Ibm Db2=10.5-fp3
and 20 more
IBM Db2 denial of service
Ibm Db2=11.5.8
Linux Linux kernel
Microsoft Windows
Opengroup Unix
<=11.5.8
IBM Db2 denial of service
Ibm Db2>=11.5<=11.5.8
Linux Linux kernel
Microsoft Windows
Opengroup Unix
<=11.5.x
IBM Db2 denial of service
Ibm Db2>=11.5<=11.5.8
Ibm Db2=11.1.4
Ibm Db2=11.1.4-fp1
Ibm Db2=11.1.4-fp2
Ibm Db2=11.1.4-fp3
Ibm Db2=11.1.4-fp4
and 7 more
IBM Db2 denial of service
Ibm Db2>=11.5<=11.5.8
Linux Linux kernel
Microsoft Windows
Opengroup Unix
<=11.5.x
IBM Db2 denial of service
Ibm Db2>=11.5<11.5.8
Ibm Db2=10.5
Ibm Db2=10.5-fp1
Ibm Db2=10.5-fp10
Ibm Db2=10.5-fp2
Ibm Db2=10.5-fp3
and 43 more
IBM Db2 denial of service
Ibm Db2>=11.5<=11.5.8
Linux Linux kernel
Microsoft Windows
Opengroup Unix
IBM IBM® Db2®<=11.5.x
>=11.5<=11.5.8
and 3 more
IBM Db2 denial of service
Ibm Db2>=11.5<11.5.8
Ibm Db2=11.1.4
Ibm Db2=11.1.4-fp1
Ibm Db2=11.1.4-fp2
Ibm Db2=11.1.4-fp3
Ibm Db2=11.1.4-fp4
and 7 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2023 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203