{"cves":[{"cve_id":"CVE-2026-35093","summary":"A flaw was found in libinput. A local attacker who can place a specially crafted Lua bytecode file in certain system or user configuration directories can bypass security restrictions. This allows the attacker to run unauthorized code with the same permissions as the program using libinput, such as a graphical compositor. This could lead to the attacker monitoring keyboard input and sending that information to an external location.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00018,"ranking_epss":0.04332,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2026-35093","https://bugzilla.redhat.com/show_bug.cgi?id=2453839","https://gitlab.freedesktop.org/libinput/libinput/-/work_items/1271"],"published_time":"2026-04-01T14:16:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-35094","summary":"A flaw was found in libinput. An attacker capable of deploying a Lua plugin file in specific system directories can exploit a dangling pointer vulnerability. This occurs when a garbage collection cleanup function is called, leaving a pointer that can then be printed to system logs. This could potentially expose sensitive data if the memory location is re-used, leading to information disclosure. For this exploit to work, Lua plugins must be enabled in libinput and loaded by the compositor.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02216,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2026-35094","https://bugzilla.redhat.com/show_bug.cgi?id=2453840","https://gitlab.freedesktop.org/libinput/libinput/-/work_items/1272"],"published_time":"2026-04-01T14:16:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4134","summary":"A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02847,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-4134","https://bugzilla.redhat.com/show_bug.cgi?id=2221700"],"published_time":"2024-11-14T11:15:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3056","summary":"A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious container will continue to exhaust resources until it is out-of-memory (OOM) killed. While the malicious container's cgroup will be removed, the IPC resources it created are not. Those resources are tied to the IPC namespace that will not be removed until all containers using it are stopped, and one non-malicious container is holding the namespace open. The malicious container is restarted, either automatically or by attacker control, repeating the process and increasing the amount of memory consumed. With a container configured to restart always, such as `podman run --restart=always`, this can result in a memory-based denial of service of the system.","cvss":7.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00356,"ranking_epss":0.57956,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2024-3056","https://bugzilla.redhat.com/show_bug.cgi?id=2270717","https://security.netapp.com/advisory/ntap-20241227-0002/"],"published_time":"2024-08-02T21:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-6290","summary":"Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00431,"ranking_epss":0.62636,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/342428008","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/342428008","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/"],"published_time":"2024-06-24T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-6291","summary":"Use after free in Swiftshader in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00276,"ranking_epss":0.51123,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/40942995","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/40942995","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/"],"published_time":"2024-06-24T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-6292","summary":"Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00276,"ranking_epss":0.51123,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/342545100","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/342545100","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/"],"published_time":"2024-06-24T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-6293","summary":"Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00317,"ranking_epss":0.54843,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/345993680","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/345993680","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/"],"published_time":"2024-06-24T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38276","summary":"Incorrect CSRF token checks resulted in multiple CSRF risks.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00268,"ranking_epss":0.50331,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/","https://moodle.org/mod/forum/discuss.php?d=459501","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/","https://moodle.org/mod/forum/discuss.php?d=459501"],"published_time":"2024-06-18T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38277","summary":"A unique key should be generated for a user's QR login key and their auto-login key, so the same key cannot be used interchangeably between the two.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00186,"ranking_epss":0.40354,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/","https://moodle.org/mod/forum/discuss.php?d=459502","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/","https://moodle.org/mod/forum/discuss.php?d=459502"],"published_time":"2024-06-18T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38273","summary":"Insufficient capability checks meant it was possible for users to gain access to BigBlueButton join URLs they did not have permission to access.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00199,"ranking_epss":0.42065,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/","https://moodle.org/mod/forum/discuss.php?d=459498","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/","https://moodle.org/mod/forum/discuss.php?d=459498"],"published_time":"2024-06-18T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38274","summary":"Insufficient escaping of calendar event titles resulted in a stored XSS risk in the event deletion prompt.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00994,"ranking_epss":0.76974,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/","https://moodle.org/mod/forum/discuss.php?d=459499","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/","https://moodle.org/mod/forum/discuss.php?d=459499"],"published_time":"2024-06-18T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5841","summary":"Use after free in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00311,"ranking_epss":0.54297,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/326765855","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/326765855","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5842","summary":"Use after free in Browser UI in Google Chrome prior to 126.0.6478.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00402,"ranking_epss":0.60886,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/40062622","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/40062622","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5843","summary":"Inappropriate implementation in Downloads in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to obfuscate security UI via a malicious file. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0012,"ranking_epss":0.30969,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/333940412","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/333940412","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5844","summary":"Heap buffer overflow in Tab Strip in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00416,"ranking_epss":0.6176,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/331960660","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/331960660","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5845","summary":"Use after free in Audio in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00337,"ranking_epss":0.5662,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/340178596","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/340178596","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5846","summary":"Use after free in PDFium in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00485,"ranking_epss":0.65397,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/341095523","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/341095523","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5847","summary":"Use after free in PDFium in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00485,"ranking_epss":0.65397,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/341313077","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/341313077","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5830","summary":"Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06188,"ranking_epss":0.90876,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/342456991","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/342456991","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5831","summary":"Use after free in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00485,"ranking_epss":0.65397,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/339171223","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/339171223","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5832","summary":"Use after free in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00337,"ranking_epss":0.5662,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/340196361","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/340196361","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5833","summary":"Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00229,"ranking_epss":0.45744,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/342602616","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/342602616","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5834","summary":"Inappropriate implementation in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01368,"ranking_epss":0.80234,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/342840932","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/342840932","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5835","summary":"Heap buffer overflow in Tab Groups in Google Chrome prior to 126.0.6478.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00099,"ranking_epss":0.27515,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/341991535","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/341991535","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5836","summary":"Inappropriate Implementation in DevTools in Google Chrome prior to 126.0.6478.54 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00467,"ranking_epss":0.64478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/341875171","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/341875171","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5837","summary":"Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00249,"ranking_epss":0.48193,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/342415789","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/342415789","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5838","summary":"Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00248,"ranking_epss":0.4816,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/342522151","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/342522151","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5839","summary":"Inappropriate Implementation in Memory Allocator in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00122,"ranking_epss":0.31276,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/340122160","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/340122160","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5840","summary":"Policy bypass in CORS in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00063,"ranking_epss":0.19414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/41492103","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/41492103","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"],"published_time":"2024-06-11T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2408","summary":"The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request:  https://github.com/openssl/openssl/pull/13817  (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable.\n\nPHP Windows builds for the versions 8.1.29, 8.2.20 and 8.3.8 and above include OpenSSL patches that fix the vulnerability.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00255,"ranking_epss":0.48918,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/php/php-src/security/advisories/GHSA-hh26-4ppw-5864","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/","https://github.com/php/php-src/security/advisories/GHSA-hh26-4ppw-5864","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/","https://security.netapp.com/advisory/ntap-20250321-0008/"],"published_time":"2024-06-09T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4577","summary":"In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use \"Best-Fit\" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.94374,"ranking_epss":0.99966,"kev":true,"propose_action":"PHP, specifically Windows-based PHP used in CGI mode, contains an OS command injection vulnerability that allows for arbitrary code execution. This vulnerability is a patch bypass for CVE-2012-1823.","ransomware_campaign":"Known","references":["http://www.openwall.com/lists/oss-security/2024/06/07/1","https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/","https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html","https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately","https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/","https://github.com/11whoami99/CVE-2024-4577","https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv","https://github.com/rapid7/metasploit-framework/pull/19247","https://github.com/watchtowrlabs/CVE-2024-4577","https://github.com/xcanwin/CVE-2024-4577-PHP-RCE","https://isc.sans.edu/diary/30994","https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/","https://security.netapp.com/advisory/ntap-20240621-0008/","https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/","https://www.php.net/ChangeLog-8.php#8.1.29","https://www.php.net/ChangeLog-8.php#8.2.20","https://www.php.net/ChangeLog-8.php#8.3.8","http://www.openwall.com/lists/oss-security/2024/06/07/1","https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/","https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html","https://blog.talosintelligence.com/new-persistent-attacks-japan/","https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately","https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/","https://github.com/11whoami99/CVE-2024-4577","https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv","https://github.com/rapid7/metasploit-framework/pull/19247","https://github.com/watchtowrlabs/CVE-2024-4577","https://github.com/xcanwin/CVE-2024-4577-PHP-RCE","https://isc.sans.edu/diary/30994","https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/","https://security.netapp.com/advisory/ntap-20240621-0008/","https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/","https://www.php.net/ChangeLog-8.php#8.1.29","https://www.php.net/ChangeLog-8.php#8.2.20","https://www.php.net/ChangeLog-8.php#8.3.8","https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577","https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4577"],"published_time":"2024-06-09T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5458","summary":"In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.03579,"ranking_epss":0.87753,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/06/07/1","https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w","https://lists.debian.org/debian-lts-announce/2024/06/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/","https://security.netapp.com/advisory/ntap-20240726-0001/","http://www.openwall.com/lists/oss-security/2024/06/07/1","https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w","https://lists.debian.org/debian-lts-announce/2024/06/msg00009.html","https://lists.debian.org/debian-lts-announce/2024/10/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/","https://security.netapp.com/advisory/ntap-20240726-0001/"],"published_time":"2024-06-09T19:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5585","summary":"In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.","cvss":7.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00874,"ranking_epss":0.75321,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/06/07/1","https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/","https://security.netapp.com/advisory/ntap-20240726-0002/","http://www.openwall.com/lists/oss-security/2024/06/07/1","https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/","https://security.netapp.com/advisory/ntap-20240726-0002/","https://www.vicarius.io/vsociety/posts/command-injection-vulnerability-in-php-on-windows-systems-cve-2024-1874-and-cve-2024-5585"],"published_time":"2024-06-09T19:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5493","summary":"Heap buffer overflow in WebRTC in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00475,"ranking_epss":0.6483,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/339877165","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/339877165","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/"],"published_time":"2024-05-30T23:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5494","summary":"Use after free in Dawn in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00521,"ranking_epss":0.66895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/338071106","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/338071106","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/"],"published_time":"2024-05-30T23:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5495","summary":"Use after free in Dawn in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00334,"ranking_epss":0.56278,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/338103465","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/338103465","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/"],"published_time":"2024-05-30T23:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5496","summary":"Use after free in Media Session in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00884,"ranking_epss":0.75458,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/338929744","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/338929744","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/"],"published_time":"2024-05-30T23:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5497","summary":"Out of bounds memory access in Browser UI in Google Chrome prior to 125.0.6422.141 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00719,"ranking_epss":0.72497,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/339061099","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/339061099","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/"],"published_time":"2024-05-30T23:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5498","summary":"Use after free in Presentation API in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26269,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/339588211","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/339588211","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/"],"published_time":"2024-05-30T23:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5499","summary":"Out of bounds write in Streams API in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01307,"ranking_epss":0.79804,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/339877167","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/339877167","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/"],"published_time":"2024-05-30T23:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32760","summary":"When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 encoder instructions can cause NGINX worker processes to terminate or cause or other potential impact.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00483,"ranking_epss":0.65273,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/05/30/4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/","https://my.f5.com/manage/s/article/K000139609","http://www.openwall.com/lists/oss-security/2024/05/30/4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/","https://my.f5.com/manage/s/article/K000139609"],"published_time":"2024-05-29T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-34161","summary":"When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00719,"ranking_epss":0.72507,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/05/30/4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/","https://my.f5.com/manage/s/article/K000139627","http://www.openwall.com/lists/oss-security/2024/05/30/4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/","https://my.f5.com/manage/s/article/K000139627"],"published_time":"2024-05-29T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-35200","summary":"When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00433,"ranking_epss":0.62855,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/05/30/4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/","https://my.f5.com/manage/s/article/K000139612","http://www.openwall.com/lists/oss-security/2024/05/30/4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/","https://my.f5.com/manage/s/article/K000139612"],"published_time":"2024-05-29T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31079","summary":"When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate or cause other potential impact. This attack requires that a request be specifically timed during the connection draining process, which the attacker has no visibility and limited influence over.","cvss":4.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00483,"ranking_epss":0.65273,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/05/30/4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/","https://my.f5.com/manage/s/article/K000139611","http://www.openwall.com/lists/oss-security/2024/05/30/4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/","https://my.f5.com/manage/s/article/K000139611"],"published_time":"2024-05-29T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5274","summary":"Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.03597,"ranking_epss":0.87781,"kev":true,"propose_action":"Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/341663589","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVC3FNI7HZLVSRIFBVUSBHI233DZYBKP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6IBUYVPD4MIFQNNYBGAPI5MOECWXXOB/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/341663589","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVC3FNI7HZLVSRIFBVUSBHI233DZYBKP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6IBUYVPD4MIFQNNYBGAPI5MOECWXXOB/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-5274"],"published_time":"2024-05-28T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5159","summary":"Heap buffer overflow in ANGLE in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00392,"ranking_epss":0.60224,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html","https://issues.chromium.org/issues/335613092","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html","https://issues.chromium.org/issues/335613092","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/"],"published_time":"2024-05-22T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5160","summary":"Heap buffer overflow in Dawn in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00392,"ranking_epss":0.60224,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html","https://issues.chromium.org/issues/338161969","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html","https://issues.chromium.org/issues/338161969","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/"],"published_time":"2024-05-22T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5157","summary":"Use after free in Scheduling in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00713,"ranking_epss":0.72349,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html","https://issues.chromium.org/issues/336012573","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html","https://issues.chromium.org/issues/336012573","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/"],"published_time":"2024-05-22T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-5158","summary":"Type Confusion in V8 in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to potentially perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00177,"ranking_epss":0.39298,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html","https://issues.chromium.org/issues/338908243","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html","https://issues.chromium.org/issues/338908243","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/"],"published_time":"2024-05-22T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-35949","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: make sure that WRITTEN is set on all metadata blocks\n\nWe previously would call btrfs_check_leaf() if we had the check\nintegrity code enabled, which meant that we could only run the extended\nleaf checks if we had WRITTEN set on the header flags.\n\nThis leaves a gap in our checking, because we could end up with\ncorruption on disk where WRITTEN isn't set on the leaf, and then the\nextended leaf checks don't get run which we rely on to validate all of\nthe item pointers to make sure we don't access memory outside of the\nextent buffer.\n\nHowever, since 732fab95abe2 (\"btrfs: check-integrity: remove\nCONFIG_BTRFS_FS_CHECK_INTEGRITY option\") we no longer call\nbtrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only\never call it on blocks that are being written out, and thus have WRITTEN\nset, or that are being read in, which should have WRITTEN set.\n\nAdd checks to make sure we have WRITTEN set appropriately, and then make\nsure __btrfs_check_leaf() always does the item checking.  This will\nprotect us from file systems that have been corrupted and no longer have\nWRITTEN set on some of the blocks.\n\nThis was hit on a crafted image tweaking the WRITTEN bit and reported by\nKASAN as out-of-bound access in the eb accessors. The example is a dir\nitem at the end of an eb.\n\n  [2.042] BTRFS warning (device loop1): bad eb member start: ptr 0x3fff start 30572544 member offset 16410 size 2\n  [2.040] general protection fault, probably for non-canonical address 0xe0009d1000000003: 0000 [#1] PREEMPT SMP KASAN NOPTI\n  [2.537] KASAN: maybe wild-memory-access in range [0x0005088000000018-0x000508800000001f]\n  [2.729] CPU: 0 PID: 2587 Comm: mount Not tainted 6.8.2 #1\n  [2.729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n  [2.621] RIP: 0010:btrfs_get_16+0x34b/0x6d0\n  [2.621] RSP: 0018:ffff88810871fab8 EFLAGS: 00000206\n  [2.621] RAX: 0000a11000000003 RBX: ffff888104ff8720 RCX: ffff88811b2288c0\n  [2.621] RDX: dffffc0000000000 RSI: ffffffff81dd8aca RDI: ffff88810871f748\n  [2.621] RBP: 000000000000401a R08: 0000000000000001 R09: ffffed10210e3ee9\n  [2.621] R10: ffff88810871f74f R11: 205d323430333737 R12: 000000000000001a\n  [2.621] R13: 000508800000001a R14: 1ffff110210e3f5d R15: ffffffff850011e8\n  [2.621] FS:  00007f56ea275840(0000) GS:ffff88811b200000(0000) knlGS:0000000000000000\n  [2.621] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  [2.621] CR2: 00007febd13b75c0 CR3: 000000010bb50000 CR4: 00000000000006f0\n  [2.621] Call Trace:\n  [2.621]  <TASK>\n  [2.621]  ? show_regs+0x74/0x80\n  [2.621]  ? die_addr+0x46/0xc0\n  [2.621]  ? exc_general_protection+0x161/0x2a0\n  [2.621]  ? asm_exc_general_protection+0x26/0x30\n  [2.621]  ? btrfs_get_16+0x33a/0x6d0\n  [2.621]  ? btrfs_get_16+0x34b/0x6d0\n  [2.621]  ? btrfs_get_16+0x33a/0x6d0\n  [2.621]  ? __pfx_btrfs_get_16+0x10/0x10\n  [2.621]  ? __pfx_mutex_unlock+0x10/0x10\n  [2.621]  btrfs_match_dir_item_name+0x101/0x1a0\n  [2.621]  btrfs_lookup_dir_item+0x1f3/0x280\n  [2.621]  ? __pfx_btrfs_lookup_dir_item+0x10/0x10\n  [2.621]  btrfs_get_tree+0xd25/0x1910\n\n[ copy more details from report ]","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.01964,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/9dff3e36ea89e8003516841c27c45af562b6ef44","https://git.kernel.org/stable/c/e03418abde871314e1a3a550f4c8afb7b89cb273","https://git.kernel.org/stable/c/ef3ba8ce8cf7075b716aa4afcefc3034215878ee","https://git.kernel.org/stable/c/e03418abde871314e1a3a550f4c8afb7b89cb273","https://git.kernel.org/stable/c/ef3ba8ce8cf7075b716aa4afcefc3034215878ee","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/"],"published_time":"2024-05-20T10:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-35947","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\ndyndbg: fix old BUG_ON in >control parser\n\nFix a BUG_ON from 2009.  Even if it looks \"unreachable\" (I didn't\nreally look), lets make sure by removing it, doing pr_err and return\n-EINVAL instead.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05533,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c","https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081","https://git.kernel.org/stable/c/3c718bddddca9cbef177ac475b94c5c91147fb38","https://git.kernel.org/stable/c/41d8ac238ab1cab01a8c71798d61903304f4e79b","https://git.kernel.org/stable/c/529e1852785599160415e964ca322ee7add7aef0","https://git.kernel.org/stable/c/a66c869b17c4c4dcf81d273b02cb0efe88e127ab","https://git.kernel.org/stable/c/a69e1bdd777ce51061111dc419801e8a2fd241cc","https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561","https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c","https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081","https://git.kernel.org/stable/c/3c718bddddca9cbef177ac475b94c5c91147fb38","https://git.kernel.org/stable/c/41d8ac238ab1cab01a8c71798d61903304f4e79b","https://git.kernel.org/stable/c/529e1852785599160415e964ca322ee7add7aef0","https://git.kernel.org/stable/c/a66c869b17c4c4dcf81d273b02cb0efe88e127ab","https://git.kernel.org/stable/c/a69e1bdd777ce51061111dc419801e8a2fd241cc","https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561","https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/"],"published_time":"2024-05-19T12:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-36048","summary":"QAbstractOAuth in Qt Network Authorization in Qt before 5.15.17, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.6, and 6.6.x through 6.7.x before 6.7.1 uses only the time to seed the PRNG, which may result in guessable values.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00483,"ranking_epss":0.65277,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560317","https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560368","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGB6KUPJFQWUBKXVDPJUMAD6KNJJEWPW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZOOZZZSK5PNRHFGQMUGUHVYWLILFJCRS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPHAI3DKDCIU6XLNS6PV6GFS2PHH3GZM/","https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560317","https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560368","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGB6KUPJFQWUBKXVDPJUMAD6KNJJEWPW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZOOZZZSK5PNRHFGQMUGUHVYWLILFJCRS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPHAI3DKDCIU6XLNS6PV6GFS2PHH3GZM/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGB6KUPJFQWUBKXVDPJUMAD6KNJJEWPW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZOOZZZSK5PNRHFGQMUGUHVYWLILFJCRS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZPHAI3DKDCIU6XLNS6PV6GFS2PHH3GZM/"],"published_time":"2024-05-18T21:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-46842","summary":"Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and\nother modes.  This in particular means that they may set registers used\nto pass 32-bit-mode hypercall arguments to values outside of the range\n32-bit code would be able to set them to.\n\nWhen processing of hypercalls takes a considerable amount of time,\nthe hypervisor may choose to invoke a hypercall continuation.  Doing so\ninvolves putting (perhaps updated) hypercall arguments in respective\nregisters.  For guests not running in 64-bit mode this further involves\na certain amount of translation of the values.\n\nUnfortunately internal sanity checking of these translated values\nassumes high halves of registers to always be clear when invoking a\nhypercall.  When this is found not to be the case, it triggers a\nconsistency check in the hypervisor and causes a crash.\n","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02093,"ranking_epss":0.84061,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://xenbits.xenproject.org/xsa/advisory-454.html","http://xenbits.xen.org/xsa/advisory-454.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/","https://xenbits.xenproject.org/xsa/advisory-454.html"],"published_time":"2024-05-16T14:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31142","summary":"Because of a logical error in XSA-407 (Branch Type Confusion), the\nmitigation is not applied properly when it is intended to be used.\nXSA-434 (Speculative Return Stack Overflow) uses the same\ninfrastructure, so is equally impacted.\n\nFor more details, see:\n  https://xenbits.xen.org/xsa/advisory-407.html\n  https://xenbits.xen.org/xsa/advisory-434.html\n","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03118,"ranking_epss":0.86856,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://xenbits.xenproject.org/xsa/advisory-455.html","http://xenbits.xen.org/xsa/advisory-455.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/","https://xenbits.xenproject.org/xsa/advisory-455.html"],"published_time":"2024-05-16T14:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4947","summary":"Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00359,"ranking_epss":0.58107,"kev":true,"propose_action":"Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/340221135","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/340221135","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4947"],"published_time":"2024-05-15T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4948","summary":"Use after free in Dawn in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00252,"ranking_epss":0.48594,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/333414294","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/333414294","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/"],"published_time":"2024-05-15T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4949","summary":"Use after free in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00252,"ranking_epss":0.48594,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/326607001","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/326607001","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/"],"published_time":"2024-05-15T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4950","summary":"Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00148,"ranking_epss":0.35323,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/40065403","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/40065403","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/"],"published_time":"2024-05-15T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3044","summary":"Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02355,"ranking_epss":0.84935,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2024/05/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TU3TYDXICKPYHMCNL7ARYYBXACEAYJ4/","https://www.libreoffice.org/about-us/security/advisories/CVE-2024-3044","https://lists.debian.org/debian-lts-announce/2024/05/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TU3TYDXICKPYHMCNL7ARYYBXACEAYJ4/","https://www.libreoffice.org/about-us/security/advisories/CVE-2024-3044"],"published_time":"2024-05-14T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32465","summary":"Git is a revision control system. The Git project recommends to avoid working in untrusted repositories, and instead to clone it first with `git clone --no-local` to obtain a clean copy. Git has specific protections to make that a safe operation even with an untrusted source repository, but vulnerabilities allow those protections to be bypassed. In the context of cloning local repositories owned by other users, this vulnerability has been covered in CVE-2024-32004. But there are circumstances where the fixes for CVE-2024-32004 are not enough: For example, when obtaining a `.zip` file containing a full copy of a Git repository, it should not be trusted by default to be safe, as e.g. hooks could be configured to run within the context of that repository. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid using Git in repositories that have been obtained via archives from untrusted sources.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00155,"ranking_epss":0.36205,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/05/14/2","https://git-scm.com/docs/git#_security","https://git-scm.com/docs/git-clone","https://github.com/git/git/commit/7b70e9efb18c2cc3f219af399bd384c5801ba1d7","https://github.com/git/git/security/advisories/GHSA-vm9j-46j9-qvq4","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/","http://www.openwall.com/lists/oss-security/2024/05/14/2","https://git-scm.com/docs/git#_security","https://git-scm.com/docs/git-clone","https://github.com/git/git/commit/7b70e9efb18c2cc3f219af399bd384c5801ba1d7","https://github.com/git/git/security/advisories/GHSA-vm9j-46j9-qvq4","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/"],"published_time":"2024-05-14T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32021","summary":"Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, when cloning a local source repository that contains symlinks via the filesystem, Git may create hardlinks to arbitrary user-readable files on the same filesystem as the target repository in the `objects/` directory. Cloning a local repository over the filesystem may creating hardlinks to arbitrary user-owned files on the same filesystem in the target Git repository's `objects/` directory. When cloning a repository over the filesystem (without explicitly specifying the `file://` protocol or `--no-local`), the optimizations for local cloning\nwill be used, which include attempting to hard link the object files instead of copying them. While the code includes checks against symbolic links in the source repository, which were added during the fix for CVE-2022-39253, these checks can still be raced because the hard link operation ultimately follows symlinks. If the object on the filesystem appears as a file during the check, and then a symlink during the operation, this will allow the adversary to bypass the check and create hardlinks in the destination objects directory to arbitrary, user-readable files. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.","cvss":3.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.9,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05527,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/05/14/2","https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/","http://www.openwall.com/lists/oss-security/2024/05/14/2","https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/"],"published_time":"2024-05-14T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32020","summary":"Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a \"proper\" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.","cvss":3.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.9,"cvss_v4":null,"epss":0.00165,"ranking_epss":0.37641,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/05/14/2","https://github.com/git/git/commit/1204e1a824c34071019fe106348eaa6d88f9528d","https://github.com/git/git/commit/9e65df5eab274bf74c7b570107aacd1303a1e703","https://github.com/git/git/security/advisories/GHSA-5rfh-556j-fhgj","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/","http://www.openwall.com/lists/oss-security/2024/05/14/2","https://github.com/git/git/commit/1204e1a824c34071019fe106348eaa6d88f9528d","https://github.com/git/git/commit/9e65df5eab274bf74c7b570107aacd1303a1e703","https://github.com/git/git/security/advisories/GHSA-5rfh-556j-fhgj","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/"],"published_time":"2024-05-14T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32004","summary":"Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid cloning repositories from untrusted sources.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.02428,"ranking_epss":0.85169,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/05/14/2","https://git-scm.com/docs/git-clone","https://github.com/git/git/commit/f4aa8c8bb11dae6e769cd930565173808cbb69c8","https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/","http://www.openwall.com/lists/oss-security/2024/05/14/2","https://git-scm.com/docs/git-clone","https://github.com/git/git/commit/f4aa8c8bb11dae6e769cd930565173808cbb69c8","https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/"],"published_time":"2024-05-14T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4761","summary":"Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02473,"ranking_epss":0.85295,"kev":true,"propose_action":"Google Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. ","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/339458194","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/339458194","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4761"],"published_time":"2024-05-14T16:17:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4855","summary":"Use after free issue in editcap could cause denial of service via crafted capture file","cvss":3.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.6,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06072,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.com/wireshark/wireshark/-/issues/19782","https://gitlab.com/wireshark/wireshark/-/issues/19783","https://gitlab.com/wireshark/wireshark/-/issues/19784","https://www.wireshark.org/security/wnpa-sec-2024-08.html","https://gitlab.com/wireshark/wireshark/-/issues/19782","https://gitlab.com/wireshark/wireshark/-/issues/19783","https://gitlab.com/wireshark/wireshark/-/issues/19784","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2BSENPSIALF2WIZF7M3QBVWYBMFGW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MKFJAZDKXGFFQPRDYLX2AANRNMYZZEZ/","https://www.wireshark.org/security/wnpa-sec-2024-08.html"],"published_time":"2024-05-14T15:45:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4853","summary":"Memory handling issue in editcap could cause denial of service via crafted capture file","cvss":3.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.6,"cvss_v4":null,"epss":0.00061,"ranking_epss":0.18952,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.com/wireshark/wireshark/-/issues/19724","https://www.wireshark.org/security/wnpa-sec-2024-08.html","https://gitlab.com/wireshark/wireshark/-/issues/19724","https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2BSENPSIALF2WIZF7M3QBVWYBMFGW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MKFJAZDKXGFFQPRDYLX2AANRNMYZZEZ/","https://www.wireshark.org/security/wnpa-sec-2024-08.html"],"published_time":"2024-05-14T15:45:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4854","summary":"MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file","cvss":6.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.4,"cvss_v4":null,"epss":0.0066,"ranking_epss":0.71133,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.com/wireshark/wireshark/-/issues/19726","https://gitlab.com/wireshark/wireshark/-/merge_requests/15047","https://gitlab.com/wireshark/wireshark/-/merge_requests/15499","https://www.wireshark.org/security/wnpa-sec-2024-07.html","https://gitlab.com/wireshark/wireshark/-/issues/19726","https://gitlab.com/wireshark/wireshark/-/merge_requests/15047","https://gitlab.com/wireshark/wireshark/-/merge_requests/15499","https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2BSENPSIALF2WIZF7M3QBVWYBMFGW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MKFJAZDKXGFFQPRDYLX2AANRNMYZZEZ/","https://www.wireshark.org/security/wnpa-sec-2024-07.html"],"published_time":"2024-05-14T15:45:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4671","summary":"Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00161,"ranking_epss":0.37031,"kev":true,"propose_action":"Google Chromium Visuals contains a use-after-free vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html","https://issues.chromium.org/issues/339266700","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html","https://issues.chromium.org/issues/339266700","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4671"],"published_time":"2024-05-14T15:44:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-34340","summary":"Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, Cacti calls `compat_password_hash` when users set their password. `compat_password_hash` use `password_hash` if there is it, else use `md5`. When verifying password, it calls `compat_password_verify`. In `compat_password_verify`, `password_verify` is called if there is it, else use `md5`. `password_verify` and `password_hash` are supported on PHP < 5.5.0, following PHP manual. The vulnerability is in `compat_password_verify`. Md5-hashed user input is compared with correct password in database by `$md5 == $hash`. It is a loose comparison, not `===`. It is a type juggling vulnerability. Version 1.2.27 contains a patch for the issue.","cvss":9.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.1,"cvss_v4":null,"epss":0.00842,"ranking_epss":0.74784,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/","https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m","https://lists.debian.org/debian-lts-announce/2024/09/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/"],"published_time":"2024-05-14T15:38:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31459","summary":"Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php` file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the `api_plugin_hook()` function in the `lib/plugin.php` file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.01844,"ranking_epss":0.83006,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv","https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r","https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/","https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv","https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r","https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp","https://lists.debian.org/debian-lts-announce/2024/09/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/"],"published_time":"2024-05-14T15:25:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31460","summary":"Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `automation_tree_rules.php` is not thoroughly checked and is used to concatenate the SQL statement in `create_all_header_nodes()`  function from `lib/api_automation.php` , finally resulting in SQL injection. Using SQL based secondary injection technology, attackers can modify the contents of the Cacti database, and based on the modified content, it may be possible to achieve further impact, such as arbitrary file reading, and even remote code execution through arbitrary file writing. Version 1.2.27 contains a patch for the issue.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01692,"ranking_epss":0.82284,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv","https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/","https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv","https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r","https://lists.debian.org/debian-lts-announce/2024/09/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/"],"published_time":"2024-05-14T15:25:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31458","summary":"Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `form_save()` function in `graph_template_inputs.php` is not thoroughly checked and is used to concatenate the SQL statement in `draw_nontemplated_fields_graph_item()` function from `lib/html_form_templates.php` , finally resulting in SQL injection. Version 1.2.27 contains a patch for the issue.","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.06015,"ranking_epss":0.90728,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/","https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x","https://lists.debian.org/debian-lts-announce/2024/09/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/"],"published_time":"2024-05-14T15:25:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31445","summary":"Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, a SQL injection vulnerability in `automation_get_new_graphs_sql` function of `api_automation.php` allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. In `api_automation.php` line 856, the `get_request_var('filter')` is being concatenated into the SQL statement without any sanitization. In `api_automation.php` line 717, The filter of `'filter'` is `FILTER_DEFAULT`, which means there is no filter for it. Version 1.2.27 contains a patch for the issue.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.39471,"ranking_epss":0.97308,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L717","https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L856","https://github.com/Cacti/cacti/commit/fd93c6e47651958b77c3bbe6a01fff695f81e886","https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/","https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L717","https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L856","https://github.com/Cacti/cacti/commit/fd93c6e47651958b77c3bbe6a01fff695f81e886","https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc","https://lists.debian.org/debian-lts-announce/2024/09/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/"],"published_time":"2024-05-14T15:25:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31443","summary":"Cacti provides an operational monitoring and fault management framework. Prior to 1.2.27, some of the data stored in `form_save()` function in `data_queries.php` is not thoroughly checked and is used to concatenate the HTML statement in `grow_right_pane_tree()` function from `lib/html.php` , finally resulting in cross-site scripting. Version 1.2.27 contains a patch for the issue.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00493,"ranking_epss":0.65757,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/commit/f946fa537d19678f938ddbd784a10e3290d275cf","https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/","https://github.com/Cacti/cacti/commit/f946fa537d19678f938ddbd784a10e3290d275cf","https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3","https://lists.debian.org/debian-lts-announce/2024/09/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/"],"published_time":"2024-05-14T15:25:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31444","summary":"Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `automation_tree_rules_form_save()` function in `automation_tree_rules.php` is not thoroughly checked and is used to concatenate the HTML statement in `form_confirm()` function from `lib/html.php` , finally resulting in cross-site scripting. Version 1.2.27 contains a patch for the issue.","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.09401,"ranking_epss":0.92798,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-p4ch-7hjw-6m87","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/","https://github.com/Cacti/cacti/security/advisories/GHSA-p4ch-7hjw-6m87","https://lists.debian.org/debian-lts-announce/2024/09/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/"],"published_time":"2024-05-14T15:25:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-29894","summary":"Cacti provides an operational monitoring and fault management framework. Versions of Cacti prior to 1.2.27 contain a residual cross-site scripting vulnerability caused by an incomplete fix for CVE-2023-50250. `raise_message_javascript` from `lib/functions.php` now uses purify.js to fix CVE-2023-50250 (among others). However, it still generates the code out of unescaped PHP variables `$title` and `$header`. If those variables contain single quotes, they can be used to inject JavaScript code. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. Version 1.2.27 fixes this issue.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00162,"ranking_epss":0.3717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-grj5-8fcj-34gh","https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/","https://github.com/Cacti/cacti/security/advisories/GHSA-grj5-8fcj-34gh","https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/"],"published_time":"2024-05-14T15:17:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27834","summary":"The issue was addressed with improved checks. This issue is fixed in Safari 17.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, watchOS 10.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":8e-05,"ranking_epss":0.00777,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.apple.com/en-us/120896","https://support.apple.com/en-us/120898","https://support.apple.com/en-us/120901","https://support.apple.com/en-us/120902","https://support.apple.com/en-us/120903","https://support.apple.com/en-us/120905","http://seclists.org/fulldisclosure/2024/May/10","http://seclists.org/fulldisclosure/2024/May/12","http://seclists.org/fulldisclosure/2024/May/16","http://seclists.org/fulldisclosure/2024/May/17","http://seclists.org/fulldisclosure/2024/May/9","http://www.openwall.com/lists/oss-security/2024/05/21/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/","https://support.apple.com/en-us/HT214101","https://support.apple.com/en-us/HT214102","https://support.apple.com/en-us/HT214103","https://support.apple.com/en-us/HT214104","https://support.apple.com/en-us/HT214106","https://support.apple.com/kb/HT214100","https://support.apple.com/kb/HT214102","https://support.apple.com/kb/HT214104","https://support.apple.com/kb/HT214106"],"published_time":"2024-05-14T15:13:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27400","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2\n\nThis reverts drm/amdgpu: fix ftrace event amdgpu_bo_move always move\non same heap. The basic problem here is that after the move the old\nlocation is simply not available any more.\n\nSome fixes were suggested, but essentially we should call the move\nnotification before actually moving things because only this way we have\nthe correct order for DMA-buf and VM move notifications as well.\n\nAlso rework the statistic handling so that we don't update the eviction\ncounter before the move.\n\nv2: add missing NULL check","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":7e-05,"ranking_epss":0.00551,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/0c7ed3ed35eec9138b88d42217b5a6b9a62bda4d","https://git.kernel.org/stable/c/5c25b169f9a0b34ee410891a96bc9d7b9ed6f9be","https://git.kernel.org/stable/c/9a4f6e138720b6e9adf7b82a71d0292f3f276480","https://git.kernel.org/stable/c/d3a9331a6591e9df64791e076f6591f440af51c3","https://git.kernel.org/stable/c/0c7ed3ed35eec9138b88d42217b5a6b9a62bda4d","https://git.kernel.org/stable/c/5c25b169f9a0b34ee410891a96bc9d7b9ed6f9be","https://git.kernel.org/stable/c/9a4f6e138720b6e9adf7b82a71d0292f3f276480","https://git.kernel.org/stable/c/d3a9331a6591e9df64791e076f6591f440af51c3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/"],"published_time":"2024-05-14T15:12:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27401","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: nosy: ensure user_length is taken into account when fetching packet contents\n\nEnsure that packet_buffer_get respects the user_length provided. If\nthe length of the head packet exceeds the user_length, packet_buffer_get\nwill now return 0 to signify to the user that no data were read\nand a larger buffer size is required. Helps prevent user space overflows.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.01183,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/1fe60ee709436550f8cfbab01295936b868d5baa","https://git.kernel.org/stable/c/38762a0763c10c24a4915feee722d7aa6e73eb98","https://git.kernel.org/stable/c/4ee0941da10e8fdcdb34756b877efd3282594c1f","https://git.kernel.org/stable/c/539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c","https://git.kernel.org/stable/c/67f34f093c0f7bf33f5b4ae64d3d695a3b978285","https://git.kernel.org/stable/c/79f988d3ffc1aa778fc5181bdfab312e57956c6b","https://git.kernel.org/stable/c/7b8c7bd2296e95b38a6ff346242356a2e7190239","https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb","https://git.kernel.org/stable/c/1fe60ee709436550f8cfbab01295936b868d5baa","https://git.kernel.org/stable/c/38762a0763c10c24a4915feee722d7aa6e73eb98","https://git.kernel.org/stable/c/4ee0941da10e8fdcdb34756b877efd3282594c1f","https://git.kernel.org/stable/c/539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c","https://git.kernel.org/stable/c/67f34f093c0f7bf33f5b4ae64d3d695a3b978285","https://git.kernel.org/stable/c/79f988d3ffc1aa778fc5181bdfab312e57956c6b","https://git.kernel.org/stable/c/7b8c7bd2296e95b38a6ff346242356a2e7190239","https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb","https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/"],"published_time":"2024-05-14T15:12:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27398","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use-after-free bugs caused by sco_sock_timeout\n\nWhen the sco connection is established and then, the sco socket\nis releasing, timeout_work will be scheduled to judge whether\nthe sco disconnection is timeout. The sock will be deallocated\nlater, but it is dereferenced again in sco_sock_timeout. As a\nresult, the use-after-free bugs will happen. The root cause is\nshown below:\n\n    Cleanup Thread               |      Worker Thread\nsco_sock_release                 |\n  sco_sock_close                 |\n    __sco_sock_close             |\n      sco_sock_set_timer         |\n        schedule_delayed_work    |\n  sco_sock_kill                  |    (wait a time)\n    sock_put(sk) //FREE          |  sco_sock_timeout\n                                 |    sock_hold(sk) //USE\n\nThe KASAN report triggered by POC is shown below:\n\n[   95.890016] ==================================================================\n[   95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0\n[   95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7\n...\n[   95.890755] Workqueue: events sco_sock_timeout\n[   95.890755] Call Trace:\n[   95.890755]  <TASK>\n[   95.890755]  dump_stack_lvl+0x45/0x110\n[   95.890755]  print_address_description+0x78/0x390\n[   95.890755]  print_report+0x11b/0x250\n[   95.890755]  ? __virt_addr_valid+0xbe/0xf0\n[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0\n[   95.890755]  kasan_report+0x139/0x170\n[   95.890755]  ? update_load_avg+0xe5/0x9f0\n[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0\n[   95.890755]  kasan_check_range+0x2c3/0x2e0\n[   95.890755]  sco_sock_timeout+0x5e/0x1c0\n[   95.890755]  process_one_work+0x561/0xc50\n[   95.890755]  worker_thread+0xab2/0x13c0\n[   95.890755]  ? pr_cont_work+0x490/0x490\n[   95.890755]  kthread+0x279/0x300\n[   95.890755]  ? pr_cont_work+0x490/0x490\n[   95.890755]  ? kthread_blkcg+0xa0/0xa0\n[   95.890755]  ret_from_fork+0x34/0x60\n[   95.890755]  ? kthread_blkcg+0xa0/0xa0\n[   95.890755]  ret_from_fork_asm+0x11/0x20\n[   95.890755]  </TASK>\n[   95.890755]\n[   95.890755] Allocated by task 506:\n[   95.890755]  kasan_save_track+0x3f/0x70\n[   95.890755]  __kasan_kmalloc+0x86/0x90\n[   95.890755]  __kmalloc+0x17f/0x360\n[   95.890755]  sk_prot_alloc+0xe1/0x1a0\n[   95.890755]  sk_alloc+0x31/0x4e0\n[   95.890755]  bt_sock_alloc+0x2b/0x2a0\n[   95.890755]  sco_sock_create+0xad/0x320\n[   95.890755]  bt_sock_create+0x145/0x320\n[   95.890755]  __sock_create+0x2e1/0x650\n[   95.890755]  __sys_socket+0xd0/0x280\n[   95.890755]  __x64_sys_socket+0x75/0x80\n[   95.890755]  do_syscall_64+0xc4/0x1b0\n[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[   95.890755]\n[   95.890755] Freed by task 506:\n[   95.890755]  kasan_save_track+0x3f/0x70\n[   95.890755]  kasan_save_free_info+0x40/0x50\n[   95.890755]  poison_slab_object+0x118/0x180\n[   95.890755]  __kasan_slab_free+0x12/0x30\n[   95.890755]  kfree+0xb2/0x240\n[   95.890755]  __sk_destruct+0x317/0x410\n[   95.890755]  sco_sock_release+0x232/0x280\n[   95.890755]  sock_close+0xb2/0x210\n[   95.890755]  __fput+0x37f/0x770\n[   95.890755]  task_work_run+0x1ae/0x210\n[   95.890755]  get_signal+0xe17/0xf70\n[   95.890755]  arch_do_signal_or_restart+0x3f/0x520\n[   95.890755]  syscall_exit_to_user_mode+0x55/0x120\n[   95.890755]  do_syscall_64+0xd1/0x1b0\n[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[   95.890755]\n[   95.890755] The buggy address belongs to the object at ffff88800c388000\n[   95.890755]  which belongs to the cache kmalloc-1k of size 1024\n[   95.890755] The buggy address is located 128 bytes inside of\n[   95.890755]  freed 1024-byte region [ffff88800c388000, ffff88800c388400)\n[   95.890755]\n[   95.890755] The buggy address belongs to the physical page:\n[   95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388\n[   95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[   95.890755] ano\n---truncated---","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0071,"ranking_epss":0.7227,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2","https://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249","https://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014","https://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53","https://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546","https://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178","https://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5","https://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93","http://www.openwall.com/lists/oss-security/2024/11/29/1","http://www.openwall.com/lists/oss-security/2024/11/30/1","http://www.openwall.com/lists/oss-security/2024/11/30/2","https://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2","https://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249","https://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014","https://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53","https://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546","https://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178","https://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5","https://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93","https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/","https://security.netapp.com/advisory/ntap-20240912-0012/"],"published_time":"2024-05-14T15:12:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27399","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout\n\nThere is a race condition between l2cap_chan_timeout() and\nl2cap_chan_del(). When we use l2cap_chan_del() to delete the\nchannel, the chan->conn will be set to null. But the conn could\nbe dereferenced again in the mutex_lock() of l2cap_chan_timeout().\nAs a result the null pointer dereference bug will happen. The\nKASAN report triggered by POC is shown below:\n\n[  472.074580] ==================================================================\n[  472.075284] BUG: KASAN: null-ptr-deref in mutex_lock+0x68/0xc0\n[  472.075308] Write of size 8 at addr 0000000000000158 by task kworker/0:0/7\n[  472.075308]\n[  472.075308] CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.9.0-rc5-00356-g78c0094a146b #36\n[  472.075308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[  472.075308] Workqueue: events l2cap_chan_timeout\n[  472.075308] Call Trace:\n[  472.075308]  <TASK>\n[  472.075308]  dump_stack_lvl+0x137/0x1a0\n[  472.075308]  print_report+0x101/0x250\n[  472.075308]  ? __virt_addr_valid+0x77/0x160\n[  472.075308]  ? mutex_lock+0x68/0xc0\n[  472.075308]  kasan_report+0x139/0x170\n[  472.075308]  ? mutex_lock+0x68/0xc0\n[  472.075308]  kasan_check_range+0x2c3/0x2e0\n[  472.075308]  mutex_lock+0x68/0xc0\n[  472.075308]  l2cap_chan_timeout+0x181/0x300\n[  472.075308]  process_one_work+0x5d2/0xe00\n[  472.075308]  worker_thread+0xe1d/0x1660\n[  472.075308]  ? pr_cont_work+0x5e0/0x5e0\n[  472.075308]  kthread+0x2b7/0x350\n[  472.075308]  ? pr_cont_work+0x5e0/0x5e0\n[  472.075308]  ? kthread_blkcg+0xd0/0xd0\n[  472.075308]  ret_from_fork+0x4d/0x80\n[  472.075308]  ? kthread_blkcg+0xd0/0xd0\n[  472.075308]  ret_from_fork_asm+0x11/0x20\n[  472.075308]  </TASK>\n[  472.075308] ==================================================================\n[  472.094860] Disabling lock debugging due to kernel taint\n[  472.096136] BUG: kernel NULL pointer dereference, address: 0000000000000158\n[  472.096136] #PF: supervisor write access in kernel mode\n[  472.096136] #PF: error_code(0x0002) - not-present page\n[  472.096136] PGD 0 P4D 0\n[  472.096136] Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI\n[  472.096136] CPU: 0 PID: 7 Comm: kworker/0:0 Tainted: G    B              6.9.0-rc5-00356-g78c0094a146b #36\n[  472.096136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[  472.096136] Workqueue: events l2cap_chan_timeout\n[  472.096136] RIP: 0010:mutex_lock+0x88/0xc0\n[  472.096136] Code: be 08 00 00 00 e8 f8 23 1f fd 4c 89 f7 be 08 00 00 00 e8 eb 23 1f fd 42 80 3c 23 00 74 08 48 88\n[  472.096136] RSP: 0018:ffff88800744fc78 EFLAGS: 00000246\n[  472.096136] RAX: 0000000000000000 RBX: 1ffff11000e89f8f RCX: ffffffff8457c865\n[  472.096136] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88800744fc78\n[  472.096136] RBP: 0000000000000158 R08: ffff88800744fc7f R09: 1ffff11000e89f8f\n[  472.096136] R10: dffffc0000000000 R11: ffffed1000e89f90 R12: dffffc0000000000\n[  472.096136] R13: 0000000000000158 R14: ffff88800744fc78 R15: ffff888007405a00\n[  472.096136] FS:  0000000000000000(0000) GS:ffff88806d200000(0000) knlGS:0000000000000000\n[  472.096136] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  472.096136] CR2: 0000000000000158 CR3: 000000000da32000 CR4: 00000000000006f0\n[  472.096136] Call Trace:\n[  472.096136]  <TASK>\n[  472.096136]  ? __die_body+0x8d/0xe0\n[  472.096136]  ? page_fault_oops+0x6b8/0x9a0\n[  472.096136]  ? kernelmode_fixup_or_oops+0x20c/0x2a0\n[  472.096136]  ? do_user_addr_fault+0x1027/0x1340\n[  472.096136]  ? _printk+0x7a/0xa0\n[  472.096136]  ? mutex_lock+0x68/0xc0\n[  472.096136]  ? add_taint+0x42/0xd0\n[  472.096136]  ? exc_page_fault+0x6a/0x1b0\n[  472.096136]  ? asm_exc_page_fault+0x26/0x30\n[  472.096136]  ? mutex_lock+0x75/0xc0\n[  472.096136]  ? mutex_lock+0x88/0xc0\n[  472.096136]  ? mutex_lock+0x75/0xc0\n[  472.096136]  l2cap_chan_timeo\n---truncated---","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00011,"ranking_epss":0.01344,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/06acb75e7ed600d0bbf7bff5628aa8f24a97978c","https://git.kernel.org/stable/c/6466ee65e5b27161c846c73ef407f49dfa1bd1d9","https://git.kernel.org/stable/c/8960ff650aec70485b40771cd8e6e8c4cb467d33","https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0","https://git.kernel.org/stable/c/adf0398cee86643b8eacde95f17d073d022f782c","https://git.kernel.org/stable/c/e137e2ba96e51902dc2878131823a96bf8e638ae","https://git.kernel.org/stable/c/e97e16433eb4533083b096a3824b93a5ca3aee79","https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4","https://git.kernel.org/stable/c/06acb75e7ed600d0bbf7bff5628aa8f24a97978c","https://git.kernel.org/stable/c/6466ee65e5b27161c846c73ef407f49dfa1bd1d9","https://git.kernel.org/stable/c/8960ff650aec70485b40771cd8e6e8c4cb467d33","https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0","https://git.kernel.org/stable/c/adf0398cee86643b8eacde95f17d073d022f782c","https://git.kernel.org/stable/c/e137e2ba96e51902dc2878131823a96bf8e638ae","https://git.kernel.org/stable/c/e97e16433eb4533083b096a3824b93a5ca3aee79","https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4","https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/","https://security.netapp.com/advisory/ntap-20240926-0001/"],"published_time":"2024-05-14T15:12:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25641","summary":"Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the \"Package Import\" feature, allows authenticated users having the \"Import Templates\" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue.","cvss":9.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.1,"cvss_v4":null,"epss":0.88383,"ranking_epss":0.99502,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2024/May/6","https://github.com/Cacti/cacti/commit/eff35b0ff26cc27c82d7880469ed6d5e3bef6210","https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/","http://seclists.org/fulldisclosure/2024/May/6","https://github.com/Cacti/cacti/commit/eff35b0ff26cc27c82d7880469ed6d5e3bef6210","https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88","https://lists.debian.org/debian-lts-announce/2024/09/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/"],"published_time":"2024-05-14T15:05:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4558","summary":"Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.0238,"ranking_epss":0.85014,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2024/Jul/15","http://seclists.org/fulldisclosure/2024/Jul/16","http://seclists.org/fulldisclosure/2024/Jul/18","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html","https://issues.chromium.org/issues/337766133","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","http://seclists.org/fulldisclosure/2024/Jul/15","http://seclists.org/fulldisclosure/2024/Jul/16","http://seclists.org/fulldisclosure/2024/Jul/18","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html","https://issues.chromium.org/issues/337766133","https://lists.debian.org/debian-lts-announce/2024/09/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://support.apple.com/kb/HT214117","https://support.apple.com/kb/HT214119","https://support.apple.com/kb/HT214121"],"published_time":"2024-05-07T19:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4559","summary":"Heap buffer overflow in WebAudio in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00409,"ranking_epss":0.61316,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html","https://issues.chromium.org/issues/331369797","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html","https://issues.chromium.org/issues/331369797","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"],"published_time":"2024-05-07T19:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-34397","summary":"An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.","cvss":5.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.2,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40868,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.gnome.org/GNOME/glib/-/issues/3268","https://lists.debian.org/debian-lts-announce/2024/05/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/","https://security.netapp.com/advisory/ntap-20240531-0008/","https://www.openwall.com/lists/oss-security/2024/05/07/5","https://gitlab.gnome.org/GNOME/glib/-/issues/3268","https://lists.debian.org/debian-lts-announce/2024/05/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/","https://security.netapp.com/advisory/ntap-20240531-0008/","https://www.openwall.com/lists/oss-security/2024/05/07/5"],"published_time":"2024-05-07T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-34064","summary":"Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00838,"ranking_epss":0.7473,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pallets/jinja/commit/0668239dc6b44ef38e7a6c9f91f312fd4ca581cb","https://github.com/pallets/jinja/security/advisories/GHSA-h75v-3vvj-5mfj","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/567XIGSZMABG6TSMYWD7MIYNJSUQQRUC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCLF44KY43BSVMTE6S53B4V5WP3FRRSE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SSCBHIL6BYKR5NRCBXP4XMP2CEEKGFVS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZALNWE3TXPPHVPSI3AZ5CTMSTAVN5UMS/","https://github.com/pallets/jinja/commit/0668239dc6b44ef38e7a6c9f91f312fd4ca581cb","https://github.com/pallets/jinja/security/advisories/GHSA-h75v-3vvj-5mfj","https://lists.debian.org/debian-lts-announce/2024/12/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/567XIGSZMABG6TSMYWD7MIYNJSUQQRUC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCLF44KY43BSVMTE6S53B4V5WP3FRRSE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SSCBHIL6BYKR5NRCBXP4XMP2CEEKGFVS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZALNWE3TXPPHVPSI3AZ5CTMSTAVN5UMS/"],"published_time":"2024-05-06T15:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-34069","summary":"Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.38929,"ranking_epss":0.97276,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pallets/werkzeug/commit/3386395b24c7371db11a5b8eaac0c91da5362692","https://github.com/pallets/werkzeug/security/advisories/GHSA-2g68-c3qc-8985","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4SH32AM3CTPMAAEOIDAN7VU565LO4IR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFERFN7PINV4MOGMGA3DPIXJPDCYOEJZ/","https://security.netapp.com/advisory/ntap-20240614-0004/","https://github.com/pallets/werkzeug/commit/3386395b24c7371db11a5b8eaac0c91da5362692","https://github.com/pallets/werkzeug/security/advisories/GHSA-2g68-c3qc-8985","https://lists.debian.org/debian-lts-announce/2025/02/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4SH32AM3CTPMAAEOIDAN7VU565LO4IR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFERFN7PINV4MOGMGA3DPIXJPDCYOEJZ/","https://security.netapp.com/advisory/ntap-20240614-0004/"],"published_time":"2024-05-06T15:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-34500","summary":"An issue was discovered in the UnlinkedWikibase extension in MediaWiki before 1.39.6, 1.40.x before 1.40.2, and 1.41.x before 1.41.1. XSS can occur through an interface message. Error messages (in the $err var) are not escaped before being passed to Html::rawElement() in the getError() function in the Hooks class.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00299,"ranking_epss":0.53317,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gerrit.wikimedia.org/r/c/mediawiki/extensions/UnlinkedWikibase/+/1002175","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://phabricator.wikimedia.org/T357203","https://gerrit.wikimedia.org/r/c/mediawiki/extensions/UnlinkedWikibase/+/1002175","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://phabricator.wikimedia.org/T357203"],"published_time":"2024-05-05T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-34502","summary":"An issue was discovered in WikibaseLexeme in MediaWiki before 1.39.6, 1.40.x before 1.40.2, and 1.41.x before 1.41.1. Loading Special:MergeLexemes will (attempt to) make an edit that merges the from-id to the to-id, even if the request was not a POST request, and even if it does not contain an edit token.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00159,"ranking_epss":0.36766,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gerrit.wikimedia.org/r/c/mediawiki/extensions/WikibaseLexeme/+/1013359","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://phabricator.wikimedia.org/T357101","https://gerrit.wikimedia.org/r/c/mediawiki/extensions/WikibaseLexeme/+/1013359","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://phabricator.wikimedia.org/T357101"],"published_time":"2024-05-05T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-34506","summary":"An issue was discovered in includes/specials/SpecialMovePage.php in MediaWiki before 1.39.7, 1.40.x before 1.40.3, and 1.41.x before 1.41.1. If a user with the necessary rights to move the page opens Special:MovePage for a page with tens of thousands of subpages, then the page will exceed the maximum request time, leading to a denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00171,"ranking_epss":0.38348,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://phabricator.wikimedia.org/T357760","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://phabricator.wikimedia.org/T357760"],"published_time":"2024-05-05T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-34507","summary":"An issue was discovered in includes/CommentFormatter/CommentParser.php in MediaWiki before 1.39.7, 1.40.x before 1.40.3, and 1.41.x before 1.41.1. XSS can occur because of mishandling of the 0x1b character, as demonstrated by Special:RecentChanges#%1b0000000.","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00442,"ranking_epss":0.63299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://phabricator.wikimedia.org/T355538","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/","https://phabricator.wikimedia.org/T355538"],"published_time":"2024-05-05T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-34402","summary":"An issue was discovered in uriparser through 0.9.7. ComposeQueryEngine in UriQuery.c has an integer overflow via long keys or values, with a resultant buffer overflow.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00459,"ranking_epss":0.64083,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/05/06/1","http://www.openwall.com/lists/oss-security/2024/05/06/3","https://github.com/uriparser/uriparser/issues/183","https://github.com/uriparser/uriparser/pull/185","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/","http://www.openwall.com/lists/oss-security/2024/05/06/1","http://www.openwall.com/lists/oss-security/2024/05/06/3","https://github.com/uriparser/uriparser/issues/183","https://github.com/uriparser/uriparser/pull/185","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/"],"published_time":"2024-05-03T01:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-34403","summary":"An issue was discovered in uriparser through 0.9.7. ComposeQueryMallocExMm in UriQuery.c has an integer overflow via a long string.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00352,"ranking_epss":0.57674,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/05/06/1","http://www.openwall.com/lists/oss-security/2024/05/06/3","https://github.com/uriparser/uriparser/issues/183","https://github.com/uriparser/uriparser/pull/186","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/","http://www.openwall.com/lists/oss-security/2024/05/06/1","http://www.openwall.com/lists/oss-security/2024/05/06/3","https://github.com/uriparser/uriparser/issues/183","https://github.com/uriparser/uriparser/pull/186","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/"],"published_time":"2024-05-03T01:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4140","summary":"An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00284,"ranking_epss":0.5185,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugs.debian.org/960062","https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2","https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8","https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531","https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d","https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1","https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63","https://github.com/rjbs/Email-MIME/issues/66","https://github.com/rjbs/Email-MIME/pull/80","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFD5BWGYAVLW6IO4SUNLTJCFFLHZYQGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YHXHDLPZ6JV4KK3Q43O6TE3WOBAIUQRC/","https://www.cve.org/CVERecord?id=CVE-2024-4140","https://bugs.debian.org/960062","https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2","https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8","https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531","https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d","https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1","https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63","https://github.com/rjbs/Email-MIME/issues/66","https://github.com/rjbs/Email-MIME/pull/80","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFD5BWGYAVLW6IO4SUNLTJCFFLHZYQGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YHXHDLPZ6JV4KK3Q43O6TE3WOBAIUQRC/","https://www.cve.org/CVERecord?id=CVE-2024-4140"],"published_time":"2024-05-02T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4215","summary":"pgAdmin <= 8.5 is affected by a multi-factor authentication bypass vulnerability. This vulnerability allows an attacker with knowledge of a legitimate account’s username and password may authenticate to the application and perform sensitive actions within the application, such as managing files and executing SQL queries, regardless of the account’s MFA enrollment status.","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08263,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pgadmin-org/pgadmin4/issues/7425","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2YFVCB4HCXU3FQBZ5XTWJZWSZUDNCXE/","https://github.com/pgadmin-org/pgadmin4/issues/7425","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2YFVCB4HCXU3FQBZ5XTWJZWSZUDNCXE/"],"published_time":"2024-05-02T18:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4216","summary":"pgAdmin <= 8.5 is affected by XSS vulnerability in /settings/store API response json payload. This vulnerability allows attackers to execute malicious script at the client end.","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43608,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pgadmin-org/pgadmin4/issues/7282","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2YFVCB4HCXU3FQBZ5XTWJZWSZUDNCXE/","https://github.com/pgadmin-org/pgadmin4/issues/7282","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2YFVCB4HCXU3FQBZ5XTWJZWSZUDNCXE/"],"published_time":"2024-05-02T18:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-47212","summary":"A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00273,"ranking_epss":0.50785,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHQQXX27ACLLYUQHWSL3DVCOGUK5ZA4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WRORYQ2Z2XXHPX36JHBUSDVY6IOMW2N/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LBIPXOBWUHPAH4QHMVP2AWWAPDDZDQ66/","https://talosintelligence.com/vulnerability_reports/TALOS-2023-1846","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHQQXX27ACLLYUQHWSL3DVCOGUK5ZA4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WRORYQ2Z2XXHPX36JHBUSDVY6IOMW2N/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LBIPXOBWUHPAH4QHMVP2AWWAPDDZDQ66/","https://talosintelligence.com/vulnerability_reports/TALOS-2023-1846","https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1846"],"published_time":"2024-05-01T16:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4058","summary":"Type confusion in ANGLE in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06327,"ranking_epss":0.91001,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/332546345","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/332546345","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"],"published_time":"2024-05-01T13:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4059","summary":"Out of bounds read in V8 API in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to leak cross-site data via a crafted HTML page. (Chromium security severity: High)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00184,"ranking_epss":0.40151,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/333182464","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/333182464","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"],"published_time":"2024-05-01T13:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4060","summary":"Use after free in Dawn in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44527,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/333420620","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/333420620","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"],"published_time":"2024-05-01T13:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4331","summary":"Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01163,"ranking_epss":0.78634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/335003891","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/335003891","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"],"published_time":"2024-05-01T13:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4368","summary":"Use after free in Dawn in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00426,"ranking_epss":0.62336,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/333508731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/333508731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"],"published_time":"2024-05-01T13:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27014","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Prevent deadlock while disabling aRFS\n\nWhen disabling aRFS under the `priv->state_lock`, any scheduled\naRFS works are canceled using the `cancel_work_sync` function,\nwhich waits for the work to end if it has already started.\nHowever, while waiting for the work handler, the handler will\ntry to acquire the `state_lock` which is already acquired.\n\nThe worker acquires the lock to delete the rules if the state\nis down, which is not the worker's responsibility since\ndisabling aRFS deletes the rules.\n\nAdd an aRFS state variable, which indicates whether the aRFS is\nenabled and prevent adding rules when the aRFS is disabled.\n\nKernel log:\n\n======================================================\nWARNING: possible circular locking dependency detected\n6.7.0-rc4_net_next_mlx5_5483eb2 #1 Tainted: G          I\n------------------------------------------------------\nethtool/386089 is trying to acquire lock:\nffff88810f21ce68 ((work_completion)(&rule->arfs_work)){+.+.}-{0:0}, at: __flush_work+0x74/0x4e0\n\nbut task is already holding lock:\nffff8884a1808cc0 (&priv->state_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-> #1 (&priv->state_lock){+.+.}-{3:3}:\n       __mutex_lock+0x80/0xc90\n       arfs_handle_work+0x4b/0x3b0 [mlx5_core]\n       process_one_work+0x1dc/0x4a0\n       worker_thread+0x1bf/0x3c0\n       kthread+0xd7/0x100\n       ret_from_fork+0x2d/0x50\n       ret_from_fork_asm+0x11/0x20\n\n-> #0 ((work_completion)(&rule->arfs_work)){+.+.}-{0:0}:\n       __lock_acquire+0x17b4/0x2c80\n       lock_acquire+0xd0/0x2b0\n       __flush_work+0x7a/0x4e0\n       __cancel_work_timer+0x131/0x1c0\n       arfs_del_rules+0x143/0x1e0 [mlx5_core]\n       mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]\n       mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]\n       ethnl_set_channels+0x28f/0x3b0\n       ethnl_default_set_doit+0xec/0x240\n       genl_family_rcv_msg_doit+0xd0/0x120\n       genl_rcv_msg+0x188/0x2c0\n       netlink_rcv_skb+0x54/0x100\n       genl_rcv+0x24/0x40\n       netlink_unicast+0x1a1/0x270\n       netlink_sendmsg+0x214/0x460\n       __sock_sendmsg+0x38/0x60\n       __sys_sendto+0x113/0x170\n       __x64_sys_sendto+0x20/0x30\n       do_syscall_64+0x40/0xe0\n       entry_SYSCALL_64_after_hwframe+0x46/0x4e\n\nother info that might help us debug this:\n\n Possible unsafe locking scenario:\n\n       CPU0                    CPU1\n       ----                    ----\n  lock(&priv->state_lock);\n                               lock((work_completion)(&rule->arfs_work));\n                               lock(&priv->state_lock);\n  lock((work_completion)(&rule->arfs_work));\n\n *** DEADLOCK ***\n\n3 locks held by ethtool/386089:\n #0: ffffffff82ea7210 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40\n #1: ffffffff82e94c88 (rtnl_mutex){+.+.}-{3:3}, at: ethnl_default_set_doit+0xd3/0x240\n #2: ffff8884a1808cc0 (&priv->state_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]\n\nstack backtrace:\nCPU: 15 PID: 386089 Comm: ethtool Tainted: G          I        6.7.0-rc4_net_next_mlx5_5483eb2 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0x60/0xa0\n check_noncircular+0x144/0x160\n __lock_acquire+0x17b4/0x2c80\n lock_acquire+0xd0/0x2b0\n ? __flush_work+0x74/0x4e0\n ? save_trace+0x3e/0x360\n ? __flush_work+0x74/0x4e0\n __flush_work+0x7a/0x4e0\n ? __flush_work+0x74/0x4e0\n ? __lock_acquire+0xa78/0x2c80\n ? lock_acquire+0xd0/0x2b0\n ? mark_held_locks+0x49/0x70\n __cancel_work_timer+0x131/0x1c0\n ? mark_held_locks+0x49/0x70\n arfs_del_rules+0x143/0x1e0 [mlx5_core]\n mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]\n mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]\n ethnl_set_channels+0x28f/0x3b0\n ethnl_default_set_doit+0xec/0x240\n genl_family_rcv_msg_doit+0xd0/0x120\n genl_rcv_msg+0x188/0x2c0\n ? ethn\n---truncated---","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.01032,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/0080bf99499468030248ebd25dd645e487dcecdc","https://git.kernel.org/stable/c/46efa4d5930cf3c2af8c01f75e0a47e4fc045e3b","https://git.kernel.org/stable/c/48c4bb81df19402d4346032353d0795260255e3b","https://git.kernel.org/stable/c/fef965764cf562f28afb997b626fc7c3cec99693","https://git.kernel.org/stable/c/0080bf99499468030248ebd25dd645e487dcecdc","https://git.kernel.org/stable/c/46efa4d5930cf3c2af8c01f75e0a47e4fc045e3b","https://git.kernel.org/stable/c/48c4bb81df19402d4346032353d0795260255e3b","https://git.kernel.org/stable/c/fef965764cf562f28afb997b626fc7c3cec99693","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27015","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: flowtable: incorrect pppoe tuple\n\npppoe traffic reaching ingress path does not match the flowtable entry\nbecause the pppoe header is expected to be at the network header offset.\nThis bug causes a mismatch in the flow table lookup, so pppoe packets\nenter the classical forwarding path.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05594,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/4ed82dd368ad883dc4284292937b882f044e625d","https://git.kernel.org/stable/c/6db5dc7b351b9569940cd1cf445e237c42cd6d27","https://git.kernel.org/stable/c/e3f078103421642fcd5f05c5e70777feb10f000d","https://git.kernel.org/stable/c/e719b52d0c56989b0f3475a03a6d64f182c85b56","https://git.kernel.org/stable/c/f1c3c61701a0b12f4906152c1626a5de580ea3d2","https://git.kernel.org/stable/c/4ed82dd368ad883dc4284292937b882f044e625d","https://git.kernel.org/stable/c/6db5dc7b351b9569940cd1cf445e237c42cd6d27","https://git.kernel.org/stable/c/e3f078103421642fcd5f05c5e70777feb10f000d","https://git.kernel.org/stable/c/e719b52d0c56989b0f3475a03a6d64f182c85b56","https://git.kernel.org/stable/c/f1c3c61701a0b12f4906152c1626a5de580ea3d2","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27016","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: flowtable: validate pppoe header\n\nEnsure there is sufficient room to access the protocol field of the\nPPPoe header. Validate it once before the flowtable lookup, then use a\nhelper function to access protocol field.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.03997,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/87b3593bed1868b2d9fe096c01bcdf0ea86cbebf","https://git.kernel.org/stable/c/8bf7c76a2a207ca2b4cfda0a279192adf27678d7","https://git.kernel.org/stable/c/a2471d271042ea18e8a6babc132a8716bb2f08b9","https://git.kernel.org/stable/c/cf366ee3bc1b7d1c76a882640ba3b3f8f1039163","https://git.kernel.org/stable/c/d06977b9a4109f8738bb276125eb6a0b772bc433","https://git.kernel.org/stable/c/87b3593bed1868b2d9fe096c01bcdf0ea86cbebf","https://git.kernel.org/stable/c/8bf7c76a2a207ca2b4cfda0a279192adf27678d7","https://git.kernel.org/stable/c/a2471d271042ea18e8a6babc132a8716bb2f08b9","https://git.kernel.org/stable/c/cf366ee3bc1b7d1c76a882640ba3b3f8f1039163","https://git.kernel.org/stable/c/d06977b9a4109f8738bb276125eb6a0b772bc433","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27017","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: walk over current view on netlink dump\n\nThe generation mask can be updated while netlink dump is in progress.\nThe pipapo set backend walk iterator cannot rely on it to infer what\nview of the datastructure is to be used. Add notation to specify if user\nwants to read/update the set.\n\nBased on patch from Florian Westphal.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00011,"ranking_epss":0.01299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/29b359cf6d95fd60730533f7f10464e95bd17c73","https://git.kernel.org/stable/c/52735a010f37580b3a569a996f878fdd87425650","https://git.kernel.org/stable/c/721715655c72640567e8742567520c99801148ed","https://git.kernel.org/stable/c/ce9fef54c5ec9912a0c9a47bac3195cc41b14679","https://git.kernel.org/stable/c/f24d8abc2bb8cbf31ec713336e402eafa8f42f60","https://git.kernel.org/stable/c/ff89db14c63a827066446460e39226c0688ef786","https://git.kernel.org/stable/c/29b359cf6d95fd60730533f7f10464e95bd17c73","https://git.kernel.org/stable/c/721715655c72640567e8742567520c99801148ed","https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27018","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: br_netfilter: skip conntrack input hook for promisc packets\n\nFor historical reasons, when bridge device is in promisc mode, packets\nthat are directed to the taps follow bridge input hook path. This patch\nadds a workaround to reset conntrack for these packets.\n\nJianbo Liu reports warning splats in their test infrastructure where\ncloned packets reach the br_netfilter input hook to confirm the\nconntrack object.\n\nScratch one bit from BR_INPUT_SKB_CB to annotate that this packet has\nreached the input hook because it is passed up to the bridge device to\nreach the taps.\n\n[   57.571874] WARNING: CPU: 1 PID: 0 at net/bridge/br_netfilter_hooks.c:616 br_nf_local_in+0x157/0x180 [br_netfilter]\n[   57.572749] Modules linked in: xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat xt_addrtype xt_conntrack nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_isc si ib_umad rdma_cm ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5ctl mlx5_core\n[   57.575158] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.8.0+ #19\n[   57.575700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[   57.576662] RIP: 0010:br_nf_local_in+0x157/0x180 [br_netfilter]\n[   57.577195] Code: fe ff ff 41 bd 04 00 00 00 be 04 00 00 00 e9 4a ff ff ff be 04 00 00 00 48 89 ef e8 f3 a9 3c e1 66 83 ad b4 00 00 00 04 eb 91 <0f> 0b e9 f1 fe ff ff 0f 0b e9 df fe ff ff 48 89 df e8 b3 53 47 e1\n[   57.578722] RSP: 0018:ffff88885f845a08 EFLAGS: 00010202\n[   57.579207] RAX: 0000000000000002 RBX: ffff88812dfe8000 RCX: 0000000000000000\n[   57.579830] RDX: ffff88885f845a60 RSI: ffff8881022dc300 RDI: 0000000000000000\n[   57.580454] RBP: ffff88885f845a60 R08: 0000000000000001 R09: 0000000000000003\n[   57.581076] R10: 00000000ffff1300 R11: 0000000000000002 R12: 0000000000000000\n[   57.581695] R13: ffff8881047ffe00 R14: ffff888108dbee00 R15: ffff88814519b800\n[   57.582313] FS:  0000000000000000(0000) GS:ffff88885f840000(0000) knlGS:0000000000000000\n[   57.583040] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   57.583564] CR2: 000000c4206aa000 CR3: 0000000103847001 CR4: 0000000000370eb0\n[   57.584194] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[   57.584820] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[   57.585440] Call Trace:\n[   57.585721]  <IRQ>\n[   57.585976]  ? __warn+0x7d/0x130\n[   57.586323]  ? br_nf_local_in+0x157/0x180 [br_netfilter]\n[   57.586811]  ? report_bug+0xf1/0x1c0\n[   57.587177]  ? handle_bug+0x3f/0x70\n[   57.587539]  ? exc_invalid_op+0x13/0x60\n[   57.587929]  ? asm_exc_invalid_op+0x16/0x20\n[   57.588336]  ? br_nf_local_in+0x157/0x180 [br_netfilter]\n[   57.588825]  nf_hook_slow+0x3d/0xd0\n[   57.589188]  ? br_handle_vlan+0x4b/0x110\n[   57.589579]  br_pass_frame_up+0xfc/0x150\n[   57.589970]  ? br_port_flags_change+0x40/0x40\n[   57.590396]  br_handle_frame_finish+0x346/0x5e0\n[   57.590837]  ? ipt_do_table+0x32e/0x430\n[   57.591221]  ? br_handle_local_finish+0x20/0x20\n[   57.591656]  br_nf_hook_thresh+0x4b/0xf0 [br_netfilter]\n[   57.592286]  ? br_handle_local_finish+0x20/0x20\n[   57.592802]  br_nf_pre_routing_finish+0x178/0x480 [br_netfilter]\n[   57.593348]  ? br_handle_local_finish+0x20/0x20\n[   57.593782]  ? nf_nat_ipv4_pre_routing+0x25/0x60 [nf_nat]\n[   57.594279]  br_nf_pre_routing+0x24c/0x550 [br_netfilter]\n[   57.594780]  ? br_nf_hook_thresh+0xf0/0xf0 [br_netfilter]\n[   57.595280]  br_handle_frame+0x1f3/0x3d0\n[   57.595676]  ? br_handle_local_finish+0x20/0x20\n[   57.596118]  ? br_handle_frame_finish+0x5e0/0x5e0\n[   57.596566]  __netif_receive_skb_core+0x25b/0xfc0\n[   57.597017]  ? __napi_build_skb+0x37/0x40\n[   57.597418]  __netif_receive_skb_list_core+0xfb/0x220","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00011,"ranking_epss":0.01399,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/3f59ac29dea0921637053908fe99268d157bbb9d","https://git.kernel.org/stable/c/43193174510ea4f3ce09b796e559a2fd9f148615","https://git.kernel.org/stable/c/751de2012eafa4d46d8081056761fa0e9cc8a178","https://git.kernel.org/stable/c/b13db0d16bc7b2a52abcf5cb71334f63faa5dbd6","https://git.kernel.org/stable/c/dceb683ab87ca3666a9bb5c0158528b646faedc4","https://git.kernel.org/stable/c/3f59ac29dea0921637053908fe99268d157bbb9d","https://git.kernel.org/stable/c/43193174510ea4f3ce09b796e559a2fd9f148615","https://git.kernel.org/stable/c/751de2012eafa4d46d8081056761fa0e9cc8a178","https://git.kernel.org/stable/c/b13db0d16bc7b2a52abcf5cb71334f63faa5dbd6","https://git.kernel.org/stable/c/dceb683ab87ca3666a9bb5c0158528b646faedc4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27019","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()\n\nnft_unregister_obj() can concurrent with __nft_obj_type_get(),\nand there is not any protection when iterate over nf_tables_objects\nlist in __nft_obj_type_get(). Therefore, there is potential data-race\nof nf_tables_objects list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_objects\nlist in __nft_obj_type_get(), and use rcu_read_lock() in the caller\nnft_obj_type_get() to protect the entire type query process.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":8e-05,"ranking_epss":0.0074,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/379bf7257bc5f2a1b1ca8514e08a871b7bf6d920","https://git.kernel.org/stable/c/4ca946b19caf655a08d5e2266d4d5526025ebb73","https://git.kernel.org/stable/c/ad333578f736d56920e090d7db1f8dec891d815e","https://git.kernel.org/stable/c/cade34279c2249eafe528564bd2e203e4ff15f88","https://git.kernel.org/stable/c/d78d867dcea69c328db30df665be5be7d0148484","https://git.kernel.org/stable/c/df7c0fb8c2b9f9cac65659332581b19682a71349","https://git.kernel.org/stable/c/379bf7257bc5f2a1b1ca8514e08a871b7bf6d920","https://git.kernel.org/stable/c/4ca946b19caf655a08d5e2266d4d5526025ebb73","https://git.kernel.org/stable/c/ad333578f736d56920e090d7db1f8dec891d815e","https://git.kernel.org/stable/c/cade34279c2249eafe528564bd2e203e4ff15f88","https://git.kernel.org/stable/c/d78d867dcea69c328db30df665be5be7d0148484","https://git.kernel.org/stable/c/df7c0fb8c2b9f9cac65659332581b19682a71349","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27021","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nr8169: fix LED-related deadlock on module removal\n\nBinding devm_led_classdev_register() to the netdev is problematic\nbecause on module removal we get a RTNL-related deadlock. Fix this\nby avoiding the device-managed LED functions.\n\nNote: We can safely call led_classdev_unregister() for a LED even\nif registering it failed, because led_classdev_unregister() detects\nthis and is a no-op in this case.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01822,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/19fa4f2a85d777a8052e869c1b892a2f7556569d","https://git.kernel.org/stable/c/53d986f39acd8ea11c9e460732bfa5add66360d9","https://git.kernel.org/stable/c/19fa4f2a85d777a8052e869c1b892a2f7556569d","https://git.kernel.org/stable/c/53d986f39acd8ea11c9e460732bfa5add66360d9","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27008","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: nv04: Fix out of bounds access\n\nWhen Output Resource (dcb->or) value is assigned in\nfabricate_dcb_output(), there may be out of bounds access to\ndac_users array in case dcb->or is zero because ffs(dcb->or) is\nused as index there.\nThe 'or' argument of fabricate_dcb_output() must be interpreted as a\nnumber of bit to set, not value.\n\nUtilize macros from 'enum nouveau_or' in calls instead of hardcoding.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02045,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/097c7918fcfa1dee233acfd1f3029f00c3bc8062","https://git.kernel.org/stable/c/26212da39ee14a52c76a202c6ae5153a84f579a5","https://git.kernel.org/stable/c/5050ae879a828d752b439e3827aac126709da6d1","https://git.kernel.org/stable/c/5fd4b090304e450aa0e7cc9cc2b4873285c6face","https://git.kernel.org/stable/c/6690cc2732e2a8d0eaca44dcbac032a4b0148042","https://git.kernel.org/stable/c/c2b97f26f081ceec3298151481687071075a25cb","https://git.kernel.org/stable/c/cf92bb778eda7830e79452c6917efa8474a30c1e","https://git.kernel.org/stable/c/df0991da7db846f7fa4ec6740350f743d3b69b04","https://git.kernel.org/stable/c/097c7918fcfa1dee233acfd1f3029f00c3bc8062","https://git.kernel.org/stable/c/26212da39ee14a52c76a202c6ae5153a84f579a5","https://git.kernel.org/stable/c/5050ae879a828d752b439e3827aac126709da6d1","https://git.kernel.org/stable/c/5fd4b090304e450aa0e7cc9cc2b4873285c6face","https://git.kernel.org/stable/c/6690cc2732e2a8d0eaca44dcbac032a4b0148042","https://git.kernel.org/stable/c/c2b97f26f081ceec3298151481687071075a25cb","https://git.kernel.org/stable/c/cf92bb778eda7830e79452c6917efa8474a30c1e","https://git.kernel.org/stable/c/df0991da7db846f7fa4ec6740350f743d3b69b04","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27012","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: restore set elements when delete set fails\n\nFrom abort path, nft_mapelem_activate() needs to restore refcounters to\nthe original state. Currently, it uses the set->ops->walk() to iterate\nover these set elements. The existing set iterator skips inactive\nelements in the next generation, this does not work from the abort path\nto restore the original state since it has to skip active elements\ninstead (not inactive ones).\n\nThis patch moves the check for inactive elements to the set iterator\ncallback, then it reverses the logic for the .activate case which\nneeds to skip active elements.\n\nToggle next generation bit for elements when delete set command is\ninvoked and call nft_clear() from .activate (abort) path to restore the\nnext generation bit.\n\nThe splat below shows an object in mappings memleak:\n\n[43929.457523] ------------[ cut here ]------------\n[43929.457532] WARNING: CPU: 0 PID: 1139 at include/net/netfilter/nf_tables.h:1237 nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables]\n[...]\n[43929.458014] RIP: 0010:nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables]\n[43929.458076] Code: 83 f8 01 77 ab 49 8d 7c 24 08 e8 37 5e d0 de 49 8b 6c 24 08 48 8d 7d 50 e8 e9 5c d0 de 8b 45 50 8d 50 ff 89 55 50 85 c0 75 86 <0f> 0b eb 82 0f 0b eb b3 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90\n[43929.458081] RSP: 0018:ffff888140f9f4b0 EFLAGS: 00010246\n[43929.458086] RAX: 0000000000000000 RBX: ffff8881434f5288 RCX: dffffc0000000000\n[43929.458090] RDX: 00000000ffffffff RSI: ffffffffa26d28a7 RDI: ffff88810ecc9550\n[43929.458093] RBP: ffff88810ecc9500 R08: 0000000000000001 R09: ffffed10281f3e8f\n[43929.458096] R10: 0000000000000003 R11: ffff0000ffff0000 R12: ffff8881434f52a0\n[43929.458100] R13: ffff888140f9f5f4 R14: ffff888151c7a800 R15: 0000000000000002\n[43929.458103] FS:  00007f0c687c4740(0000) GS:ffff888390800000(0000) knlGS:0000000000000000\n[43929.458107] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[43929.458111] CR2: 00007f58dbe5b008 CR3: 0000000123602005 CR4: 00000000001706f0\n[43929.458114] Call Trace:\n[43929.458118]  <TASK>\n[43929.458121]  ? __warn+0x9f/0x1a0\n[43929.458127]  ? nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables]\n[43929.458188]  ? report_bug+0x1b1/0x1e0\n[43929.458196]  ? handle_bug+0x3c/0x70\n[43929.458200]  ? exc_invalid_op+0x17/0x40\n[43929.458211]  ? nft_setelem_data_deactivate+0xd7/0xf0 [nf_tables]\n[43929.458271]  ? nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables]\n[43929.458332]  nft_mapelem_deactivate+0x24/0x30 [nf_tables]\n[43929.458392]  nft_rhash_walk+0xdd/0x180 [nf_tables]\n[43929.458453]  ? __pfx_nft_rhash_walk+0x10/0x10 [nf_tables]\n[43929.458512]  ? rb_insert_color+0x2e/0x280\n[43929.458520]  nft_map_deactivate+0xdc/0x1e0 [nf_tables]\n[43929.458582]  ? __pfx_nft_map_deactivate+0x10/0x10 [nf_tables]\n[43929.458642]  ? __pfx_nft_mapelem_deactivate+0x10/0x10 [nf_tables]\n[43929.458701]  ? __rcu_read_unlock+0x46/0x70\n[43929.458709]  nft_delset+0xff/0x110 [nf_tables]\n[43929.458769]  nft_flush_table+0x16f/0x460 [nf_tables]\n[43929.458830]  nf_tables_deltable+0x501/0x580 [nf_tables]","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":8e-05,"ranking_epss":0.00784,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/86658fc7414d4b9e25c2699d751034537503d637","https://git.kernel.org/stable/c/e79b47a8615d42c68aaeb68971593333667382ed","https://git.kernel.org/stable/c/86658fc7414d4b9e25c2699d751034537503d637","https://git.kernel.org/stable/c/e79b47a8615d42c68aaeb68971593333667382ed","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27013","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\ntun: limit printing rate when illegal packet received by tun dev\n\nvhost_worker will call tun call backs to receive packets. If too many\nillegal packets arrives, tun_do_read will keep dumping packet contents.\nWhen console is enabled, it will costs much more cpu time to dump\npacket and soft lockup will be detected.\n\nnet_ratelimit mechanism can be used to limit the dumping rate.\n\nPID: 33036    TASK: ffff949da6f20000  CPU: 23   COMMAND: \"vhost-32980\"\n #0 [fffffe00003fce50] crash_nmi_callback at ffffffff89249253\n #1 [fffffe00003fce58] nmi_handle at ffffffff89225fa3\n #2 [fffffe00003fceb0] default_do_nmi at ffffffff8922642e\n #3 [fffffe00003fced0] do_nmi at ffffffff8922660d\n #4 [fffffe00003fcef0] end_repeat_nmi at ffffffff89c01663\n    [exception RIP: io_serial_in+20]\n    RIP: ffffffff89792594  RSP: ffffa655314979e8  RFLAGS: 00000002\n    RAX: ffffffff89792500  RBX: ffffffff8af428a0  RCX: 0000000000000000\n    RDX: 00000000000003fd  RSI: 0000000000000005  RDI: ffffffff8af428a0\n    RBP: 0000000000002710   R8: 0000000000000004   R9: 000000000000000f\n    R10: 0000000000000000  R11: ffffffff8acbf64f  R12: 0000000000000020\n    R13: ffffffff8acbf698  R14: 0000000000000058  R15: 0000000000000000\n    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018\n #5 [ffffa655314979e8] io_serial_in at ffffffff89792594\n #6 [ffffa655314979e8] wait_for_xmitr at ffffffff89793470\n #7 [ffffa65531497a08] serial8250_console_putchar at ffffffff897934f6\n #8 [ffffa65531497a20] uart_console_write at ffffffff8978b605\n #9 [ffffa65531497a48] serial8250_console_write at ffffffff89796558\n #10 [ffffa65531497ac8] console_unlock at ffffffff89316124\n #11 [ffffa65531497b10] vprintk_emit at ffffffff89317c07\n #12 [ffffa65531497b68] printk at ffffffff89318306\n #13 [ffffa65531497bc8] print_hex_dump at ffffffff89650765\n #14 [ffffa65531497ca8] tun_do_read at ffffffffc0b06c27 [tun]\n #15 [ffffa65531497d38] tun_recvmsg at ffffffffc0b06e34 [tun]\n #16 [ffffa65531497d68] handle_rx at ffffffffc0c5d682 [vhost_net]\n #17 [ffffa65531497ed0] vhost_worker at ffffffffc0c644dc [vhost]\n #18 [ffffa65531497f10] kthread at ffffffff892d2e72\n #19 [ffffa65531497f50] ret_from_fork at ffffffff89c0022f","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/14cdb43dbc827e18ac7d5b30c5b4c676219f1421","https://git.kernel.org/stable/c/40f4ced305c6c47487d3cd8da54676e2acc1a6ad","https://git.kernel.org/stable/c/4b0dcae5c4797bf31c63011ed62917210d3fdac3","https://git.kernel.org/stable/c/52854101180beccdb9dc2077a3bea31b6ad48dfa","https://git.kernel.org/stable/c/62e27ef18eb4f0d33bbae8e9ef56b99696a74713","https://git.kernel.org/stable/c/68459b8e3ee554ce71878af9eb69659b9462c588","https://git.kernel.org/stable/c/a50dbeca28acf7051dfa92786b85f704c75db6eb","https://git.kernel.org/stable/c/f8bbc07ac535593139c875ffa19af924b1084540","https://git.kernel.org/stable/c/14cdb43dbc827e18ac7d5b30c5b4c676219f1421","https://git.kernel.org/stable/c/40f4ced305c6c47487d3cd8da54676e2acc1a6ad","https://git.kernel.org/stable/c/4b0dcae5c4797bf31c63011ed62917210d3fdac3","https://git.kernel.org/stable/c/52854101180beccdb9dc2077a3bea31b6ad48dfa","https://git.kernel.org/stable/c/62e27ef18eb4f0d33bbae8e9ef56b99696a74713","https://git.kernel.org/stable/c/68459b8e3ee554ce71878af9eb69659b9462c588","https://git.kernel.org/stable/c/a50dbeca28acf7051dfa92786b85f704c75db6eb","https://git.kernel.org/stable/c/f8bbc07ac535593139c875ffa19af924b1084540","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27000","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: mxs-auart: add spinlock around changing cts state\n\nThe uart_handle_cts_change() function in serial_core expects the caller\nto hold uport->lock. For example, I have seen the below kernel splat,\nwhen the Bluetooth driver is loaded on an i.MX28 board.\n\n    [   85.119255] ------------[ cut here ]------------\n    [   85.124413] WARNING: CPU: 0 PID: 27 at /drivers/tty/serial/serial_core.c:3453 uart_handle_cts_change+0xb4/0xec\n    [   85.134694] Modules linked in: hci_uart bluetooth ecdh_generic ecc wlcore_sdio configfs\n    [   85.143314] CPU: 0 PID: 27 Comm: kworker/u3:0 Not tainted 6.6.3-00021-gd62a2f068f92 #1\n    [   85.151396] Hardware name: Freescale MXS (Device Tree)\n    [   85.156679] Workqueue: hci0 hci_power_on [bluetooth]\n    (...)\n    [   85.191765]  uart_handle_cts_change from mxs_auart_irq_handle+0x380/0x3f4\n    [   85.198787]  mxs_auart_irq_handle from __handle_irq_event_percpu+0x88/0x210\n    (...)","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.03214,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/0dc0637e6b16158af85945425821bfd0151adb37","https://git.kernel.org/stable/c/21535ef0ac1945080198fe3e4347ea498205c99a","https://git.kernel.org/stable/c/2c9b943e9924cf1269e44289bc5e60e51b0f5270","https://git.kernel.org/stable/c/479244d68f5d94f3903eced52b093c1e01ddb495","https://git.kernel.org/stable/c/54c4ec5f8c471b7c1137a1f769648549c423c026","https://git.kernel.org/stable/c/56434e295bd446142025913bfdf1587f5e1970ad","https://git.kernel.org/stable/c/5f40fd6ca2cf0bfbc5a5c9e403dfce8ca899ba37","https://git.kernel.org/stable/c/94b0e65c75f4af888ab2dd6c90f060f762924e86","https://git.kernel.org/stable/c/0dc0637e6b16158af85945425821bfd0151adb37","https://git.kernel.org/stable/c/21535ef0ac1945080198fe3e4347ea498205c99a","https://git.kernel.org/stable/c/2c9b943e9924cf1269e44289bc5e60e51b0f5270","https://git.kernel.org/stable/c/479244d68f5d94f3903eced52b093c1e01ddb495","https://git.kernel.org/stable/c/54c4ec5f8c471b7c1137a1f769648549c423c026","https://git.kernel.org/stable/c/56434e295bd446142025913bfdf1587f5e1970ad","https://git.kernel.org/stable/c/5f40fd6ca2cf0bfbc5a5c9e403dfce8ca899ba37","https://git.kernel.org/stable/c/94b0e65c75f4af888ab2dd6c90f060f762924e86","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27001","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: vmk80xx: fix incomplete endpoint checking\n\nWhile vmk80xx does have endpoint checking implemented, some things\ncan fall through the cracks. Depending on the hardware model,\nURBs can have either bulk or interrupt type, and current version\nof vmk80xx_find_usb_endpoints() function does not take that fully\ninto account. While this warning does not seem to be too harmful,\nat the very least it will crash systems with 'panic_on_warn' set on\nthem.\n\nFix the issue found by Syzkaller [1] by somewhat simplifying the\nendpoint checking process with usb_find_common_endpoints() and\nensuring that only expected endpoint types are present.\n\nThis patch has not been tested on real hardware.\n\n[1] Syzkaller report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 781 at drivers/usb/core/urb.c:504 usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503\n...\nCall Trace:\n <TASK>\n usb_start_wait_urb+0x113/0x520 drivers/usb/core/message.c:59\n vmk80xx_reset_device drivers/comedi/drivers/vmk80xx.c:227 [inline]\n vmk80xx_auto_attach+0xa1c/0x1a40 drivers/comedi/drivers/vmk80xx.c:818\n comedi_auto_config+0x238/0x380 drivers/comedi/drivers.c:1067\n usb_probe_interface+0x5cd/0xb00 drivers/usb/core/driver.c:399\n...\n\nSimilar issue also found by Syzkaller:","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.05966,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/3a63ae0348d990e137cca04eced5b08379969ea9","https://git.kernel.org/stable/c/59f33af9796160f851641d960bd93937f282c696","https://git.kernel.org/stable/c/6ec3514a7d35ad9cfab600187612c29f669069d2","https://git.kernel.org/stable/c/a3b8ae7e9297dd453f2977b011c5bc75eb20e71b","https://git.kernel.org/stable/c/ac882d6b21bffecb57bcc4486701239eef5aa67b","https://git.kernel.org/stable/c/b0b268eeb087e324ef3ea71f8e6cabd07630517f","https://git.kernel.org/stable/c/d1718530e3f640b7d5f0050e725216eab57a85d8","https://git.kernel.org/stable/c/f15370e315976198f338b41611f37ce82af6cf54","https://git.kernel.org/stable/c/3a63ae0348d990e137cca04eced5b08379969ea9","https://git.kernel.org/stable/c/59f33af9796160f851641d960bd93937f282c696","https://git.kernel.org/stable/c/6ec3514a7d35ad9cfab600187612c29f669069d2","https://git.kernel.org/stable/c/a3b8ae7e9297dd453f2977b011c5bc75eb20e71b","https://git.kernel.org/stable/c/ac882d6b21bffecb57bcc4486701239eef5aa67b","https://git.kernel.org/stable/c/b0b268eeb087e324ef3ea71f8e6cabd07630517f","https://git.kernel.org/stable/c/d1718530e3f640b7d5f0050e725216eab57a85d8","https://git.kernel.org/stable/c/f15370e315976198f338b41611f37ce82af6cf54","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27004","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nclk: Get runtime PM before walking tree during disable_unused\n\nDoug reported [1] the following hung task:\n\n INFO: task swapper/0:1 blocked for more than 122 seconds.\n       Not tainted 5.15.149-21875-gf795ebc40eb8 #1\n \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:swapper/0       state:D stack:    0 pid:    1 ppid:     0 flags:0x00000008\n Call trace:\n  __switch_to+0xf4/0x1f4\n  __schedule+0x418/0xb80\n  schedule+0x5c/0x10c\n  rpm_resume+0xe0/0x52c\n  rpm_resume+0x178/0x52c\n  __pm_runtime_resume+0x58/0x98\n  clk_pm_runtime_get+0x30/0xb0\n  clk_disable_unused_subtree+0x58/0x208\n  clk_disable_unused_subtree+0x38/0x208\n  clk_disable_unused_subtree+0x38/0x208\n  clk_disable_unused_subtree+0x38/0x208\n  clk_disable_unused_subtree+0x38/0x208\n  clk_disable_unused+0x4c/0xe4\n  do_one_initcall+0xcc/0x2d8\n  do_initcall_level+0xa4/0x148\n  do_initcalls+0x5c/0x9c\n  do_basic_setup+0x24/0x30\n  kernel_init_freeable+0xec/0x164\n  kernel_init+0x28/0x120\n  ret_from_fork+0x10/0x20\n INFO: task kworker/u16:0:9 blocked for more than 122 seconds.\n       Not tainted 5.15.149-21875-gf795ebc40eb8 #1\n \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:kworker/u16:0   state:D stack:    0 pid:    9 ppid:     2 flags:0x00000008\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n  __switch_to+0xf4/0x1f4\n  __schedule+0x418/0xb80\n  schedule+0x5c/0x10c\n  schedule_preempt_disabled+0x2c/0x48\n  __mutex_lock+0x238/0x488\n  __mutex_lock_slowpath+0x1c/0x28\n  mutex_lock+0x50/0x74\n  clk_prepare_lock+0x7c/0x9c\n  clk_core_prepare_lock+0x20/0x44\n  clk_prepare+0x24/0x30\n  clk_bulk_prepare+0x40/0xb0\n  mdss_runtime_resume+0x54/0x1c8\n  pm_generic_runtime_resume+0x30/0x44\n  __genpd_runtime_resume+0x68/0x7c\n  genpd_runtime_resume+0x108/0x1f4\n  __rpm_callback+0x84/0x144\n  rpm_callback+0x30/0x88\n  rpm_resume+0x1f4/0x52c\n  rpm_resume+0x178/0x52c\n  __pm_runtime_resume+0x58/0x98\n  __device_attach+0xe0/0x170\n  device_initial_probe+0x1c/0x28\n  bus_probe_device+0x3c/0x9c\n  device_add+0x644/0x814\n  mipi_dsi_device_register_full+0xe4/0x170\n  devm_mipi_dsi_device_register_full+0x28/0x70\n  ti_sn_bridge_probe+0x1dc/0x2c0\n  auxiliary_bus_probe+0x4c/0x94\n  really_probe+0xcc/0x2c8\n  __driver_probe_device+0xa8/0x130\n  driver_probe_device+0x48/0x110\n  __device_attach_driver+0xa4/0xcc\n  bus_for_each_drv+0x8c/0xd8\n  __device_attach+0xf8/0x170\n  device_initial_probe+0x1c/0x28\n  bus_probe_device+0x3c/0x9c\n  deferred_probe_work_func+0x9c/0xd8\n  process_one_work+0x148/0x518\n  worker_thread+0x138/0x350\n  kthread+0x138/0x1e0\n  ret_from_fork+0x10/0x20\n\nThe first thread is walking the clk tree and calling\nclk_pm_runtime_get() to power on devices required to read the clk\nhardware via struct clk_ops::is_enabled(). This thread holds the clk\nprepare_lock, and is trying to runtime PM resume a device, when it finds\nthat the device is in the process of resuming so the thread schedule()s\naway waiting for the device to finish resuming before continuing. The\nsecond thread is runtime PM resuming the same device, but the runtime\nresume callback is calling clk_prepare(), trying to grab the\nprepare_lock waiting on the first thread.\n\nThis is a classic ABBA deadlock. To properly fix the deadlock, we must\nnever runtime PM resume or suspend a device with the clk prepare_lock\nheld. Actually doing that is near impossible today because the global\nprepare_lock would have to be dropped in the middle of the tree, the\ndevice runtime PM resumed/suspended, and then the prepare_lock grabbed\nagain to ensure consistency of the clk tree topology. If anything\nchanges with the clk tree in the meantime, we've lost and will need to\nstart the operation all over again.\n\nLuckily, most of the time we're simply incrementing or decrementing the\nruntime PM count on an active device, so we don't have the chance to\nschedule away with the prepare_lock held. Let's fix this immediate\nproblem that can be\n---truncated---","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.03295,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/115554862294397590088ba02f11f2aba6d5016c","https://git.kernel.org/stable/c/253ab38d1ee652a596942156978a233970d185ba","https://git.kernel.org/stable/c/4af115f1a20a3d9093586079206ee37c2ac55123","https://git.kernel.org/stable/c/60ff482c4205a5aac3b0595ab794cfd62295dab5","https://git.kernel.org/stable/c/a29ec0465dce0b871003698698ac6fa92c9a5034","https://git.kernel.org/stable/c/a424e713e0cc33d4b969cfda25b9f46df4d7b5bc","https://git.kernel.org/stable/c/e581cf5d216289ef292d1a4036d53ce90e122469","https://git.kernel.org/stable/c/115554862294397590088ba02f11f2aba6d5016c","https://git.kernel.org/stable/c/253ab38d1ee652a596942156978a233970d185ba","https://git.kernel.org/stable/c/4af115f1a20a3d9093586079206ee37c2ac55123","https://git.kernel.org/stable/c/60ff482c4205a5aac3b0595ab794cfd62295dab5","https://git.kernel.org/stable/c/a29ec0465dce0b871003698698ac6fa92c9a5034","https://git.kernel.org/stable/c/a424e713e0cc33d4b969cfda25b9f46df4d7b5bc","https://git.kernel.org/stable/c/e581cf5d216289ef292d1a4036d53ce90e122469","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26994","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nspeakup: Avoid crash on very long word\n\nIn case a console is set up really large and contains a really long word\n(> 256 characters), we have to stop before the length of the word buffer.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.05835,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/0d130158db29f5e0b3893154908cf618896450a8","https://git.kernel.org/stable/c/0efb15c14c493263cb3a5f65f5ddfd4603d19a76","https://git.kernel.org/stable/c/6401038acfa24cba9c28cce410b7505efadd0222","https://git.kernel.org/stable/c/756c5cb7c09e537b87b5d3acafcb101b2ccf394f","https://git.kernel.org/stable/c/89af25bd4b4bf6a71295f07e07a8ae7dc03c6595","https://git.kernel.org/stable/c/8defb1d22ba0395b81feb963b96e252b097ba76f","https://git.kernel.org/stable/c/8f6b62125befe1675446923e4171eac2c012959c","https://git.kernel.org/stable/c/c8d2f34ea96ea3bce6ba2535f867f0d4ee3b22e1","https://git.kernel.org/stable/c/0d130158db29f5e0b3893154908cf618896450a8","https://git.kernel.org/stable/c/0efb15c14c493263cb3a5f65f5ddfd4603d19a76","https://git.kernel.org/stable/c/6401038acfa24cba9c28cce410b7505efadd0222","https://git.kernel.org/stable/c/756c5cb7c09e537b87b5d3acafcb101b2ccf394f","https://git.kernel.org/stable/c/89af25bd4b4bf6a71295f07e07a8ae7dc03c6595","https://git.kernel.org/stable/c/8defb1d22ba0395b81feb963b96e252b097ba76f","https://git.kernel.org/stable/c/8f6b62125befe1675446923e4171eac2c012959c","https://git.kernel.org/stable/c/c8d2f34ea96ea3bce6ba2535f867f0d4ee3b22e1","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26986","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Fix memory leak in create_process failure\n\nFix memory leak due to a leaked mmget reference on an error handling\ncode path that is triggered when attempting to create KFD processes\nwhile a GPU reset is in progress.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01583,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/0dcd876411644da98a6b4d5a18d32ca94c15bdb5","https://git.kernel.org/stable/c/18921b205012568b45760753ad3146ddb9e2d4e2","https://git.kernel.org/stable/c/aa02d43367a9adf8c85fb382fea4171fb266c8d0","https://git.kernel.org/stable/c/0dcd876411644da98a6b4d5a18d32ca94c15bdb5","https://git.kernel.org/stable/c/18921b205012568b45760753ad3146ddb9e2d4e2","https://git.kernel.org/stable/c/aa02d43367a9adf8c85fb382fea4171fb266c8d0","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26987","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled\n\nWhen I did hard offline test with hugetlb pages, below deadlock occurs:\n\n======================================================\nWARNING: possible circular locking dependency detected\n6.8.0-11409-gf6cef5f8c37f #1 Not tainted\n------------------------------------------------------\nbash/46904 is trying to acquire lock:\nffffffffabe68910 (cpu_hotplug_lock){++++}-{0:0}, at: static_key_slow_dec+0x16/0x60\n\nbut task is already holding lock:\nffffffffabf92ea8 (pcp_batch_high_lock){+.+.}-{3:3}, at: zone_pcp_disable+0x16/0x40\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-> #1 (pcp_batch_high_lock){+.+.}-{3:3}:\n       __mutex_lock+0x6c/0x770\n       page_alloc_cpu_online+0x3c/0x70\n       cpuhp_invoke_callback+0x397/0x5f0\n       __cpuhp_invoke_callback_range+0x71/0xe0\n       _cpu_up+0xeb/0x210\n       cpu_up+0x91/0xe0\n       cpuhp_bringup_mask+0x49/0xb0\n       bringup_nonboot_cpus+0xb7/0xe0\n       smp_init+0x25/0xa0\n       kernel_init_freeable+0x15f/0x3e0\n       kernel_init+0x15/0x1b0\n       ret_from_fork+0x2f/0x50\n       ret_from_fork_asm+0x1a/0x30\n\n-> #0 (cpu_hotplug_lock){++++}-{0:0}:\n       __lock_acquire+0x1298/0x1cd0\n       lock_acquire+0xc0/0x2b0\n       cpus_read_lock+0x2a/0xc0\n       static_key_slow_dec+0x16/0x60\n       __hugetlb_vmemmap_restore_folio+0x1b9/0x200\n       dissolve_free_huge_page+0x211/0x260\n       __page_handle_poison+0x45/0xc0\n       memory_failure+0x65e/0xc70\n       hard_offline_page_store+0x55/0xa0\n       kernfs_fop_write_iter+0x12c/0x1d0\n       vfs_write+0x387/0x550\n       ksys_write+0x64/0xe0\n       do_syscall_64+0xca/0x1e0\n       entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nother info that might help us debug this:\n\n Possible unsafe locking scenario:\n\n       CPU0                    CPU1\n       ----                    ----\n  lock(pcp_batch_high_lock);\n                               lock(cpu_hotplug_lock);\n                               lock(pcp_batch_high_lock);\n  rlock(cpu_hotplug_lock);\n\n *** DEADLOCK ***\n\n5 locks held by bash/46904:\n #0: ffff98f6c3bb23f0 (sb_writers#5){.+.+}-{0:0}, at: ksys_write+0x64/0xe0\n #1: ffff98f6c328e488 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0xf8/0x1d0\n #2: ffff98ef83b31890 (kn->active#113){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x100/0x1d0\n #3: ffffffffabf9db48 (mf_mutex){+.+.}-{3:3}, at: memory_failure+0x44/0xc70\n #4: ffffffffabf92ea8 (pcp_batch_high_lock){+.+.}-{3:3}, at: zone_pcp_disable+0x16/0x40\n\nstack backtrace:\nCPU: 10 PID: 46904 Comm: bash Kdump: loaded Not tainted 6.8.0-11409-gf6cef5f8c37f #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0x68/0xa0\n check_noncircular+0x129/0x140\n __lock_acquire+0x1298/0x1cd0\n lock_acquire+0xc0/0x2b0\n cpus_read_lock+0x2a/0xc0\n static_key_slow_dec+0x16/0x60\n __hugetlb_vmemmap_restore_folio+0x1b9/0x200\n dissolve_free_huge_page+0x211/0x260\n __page_handle_poison+0x45/0xc0\n memory_failure+0x65e/0xc70\n hard_offline_page_store+0x55/0xa0\n kernfs_fop_write_iter+0x12c/0x1d0\n vfs_write+0x387/0x550\n ksys_write+0x64/0xe0\n do_syscall_64+0xca/0x1e0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\nRIP: 0033:0x7fc862314887\nCode: 10 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24\nRSP: 002b:00007fff19311268 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007fc862314887\nRDX: 000000000000000c RSI: 000056405645fe10 RDI: 0000000000000001\nRBP: 000056405645fe10 R08: 00007fc8623d1460 R09: 000000007fffffff\nR10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c\nR13: 00007fc86241b780 R14: 00007fc862417600 R15: 00007fc862416a00\n\nIn short, below scene breaks the \n---truncated---","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.03877,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/1983184c22dd84a4d95a71e5c6775c2638557dc7","https://git.kernel.org/stable/c/49955b24002dc16a0ae2e83a57a2a6c863a1845c","https://git.kernel.org/stable/c/5ef7ba2799a3b5ed292b8f6407376e2c25ef002e","https://git.kernel.org/stable/c/882e1180c83f5b75bae03d0ccc31ccedfe5159de","https://git.kernel.org/stable/c/1983184c22dd84a4d95a71e5c6775c2638557dc7","https://git.kernel.org/stable/c/49955b24002dc16a0ae2e83a57a2a6c863a1845c","https://git.kernel.org/stable/c/5ef7ba2799a3b5ed292b8f6407376e2c25ef002e","https://git.kernel.org/stable/c/882e1180c83f5b75bae03d0ccc31ccedfe5159de","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26988","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\ninit/main.c: Fix potential static_command_line memory overflow\n\nWe allocate memory of size 'xlen + strlen(boot_command_line) + 1' for\nstatic_command_line, but the strings copied into static_command_line are\nextra_command_line and command_line, rather than extra_command_line and\nboot_command_line.\n\nWhen strlen(command_line) > strlen(boot_command_line), static_command_line\nwill overflow.\n\nThis patch just recovers strlen(command_line) which was miss-consolidated\nwith strlen(boot_command_line) in the commit f5c7310ac73e (\"init/main: add\nchecks for the return value of memblock_alloc*()\")","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01574,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/0dc727a4e05400205358a22c3d01ccad2c8e1fe4","https://git.kernel.org/stable/c/2ef607ea103616aec0289f1b65d103d499fa903a","https://git.kernel.org/stable/c/46dad3c1e57897ab9228332f03e1c14798d2d3b9","https://git.kernel.org/stable/c/76c2f4d426a5358fced5d5990744d46f10a4ccea","https://git.kernel.org/stable/c/81cf85ae4f2dd5fa3e43021782aa72c4c85558e8","https://git.kernel.org/stable/c/936a02b5a9630c5beb0353c3085cc49d86c57034","https://git.kernel.org/stable/c/0dc727a4e05400205358a22c3d01ccad2c8e1fe4","https://git.kernel.org/stable/c/2ef607ea103616aec0289f1b65d103d499fa903a","https://git.kernel.org/stable/c/46dad3c1e57897ab9228332f03e1c14798d2d3b9","https://git.kernel.org/stable/c/76c2f4d426a5358fced5d5990744d46f10a4ccea","https://git.kernel.org/stable/c/81cf85ae4f2dd5fa3e43021782aa72c4c85558e8","https://git.kernel.org/stable/c/936a02b5a9630c5beb0353c3085cc49d86c57034","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-05-01T06:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1874","summary":"In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.","cvss":9.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.4,"cvss_v4":null,"epss":0.63376,"ranking_epss":0.98412,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/04/12/11","http://www.openwall.com/lists/oss-security/2024/06/07/1","https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/","https://security.netapp.com/advisory/ntap-20240510-0009/","http://www.openwall.com/lists/oss-security/2024/04/12/11","http://www.openwall.com/lists/oss-security/2024/06/07/1","https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZK3X6B7FBE32FETDSMRLJXTFTHKWSY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGWIK3HMBACERGB4TSBB2JUOMPYY2VKY/","https://security.netapp.com/advisory/ntap-20240510-0009/","https://www.kb.cert.org/vuls/id/123335","https://www.vicarius.io/vsociety/posts/command-injection-vulnerability-in-php-on-windows-systems-cve-2024-1874-and-cve-2024-5585"],"published_time":"2024-04-29T04:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-22391","summary":"A heap-based buffer overflow vulnerability exists in the LookupTable::SetLUT functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability.","cvss":7.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00186,"ranking_epss":0.40365,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZJ4IG7EXMSMPHTK5ZFASCW6MHSOVZOE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5HXUKUJ7SG3TK456SGUWVZ4Z5D7JKOL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJA7QWWZWMY4AQFR35EA7S3CFVUTOQYG/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1924","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZJ4IG7EXMSMPHTK5ZFASCW6MHSOVZOE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5HXUKUJ7SG3TK456SGUWVZ4Z5D7JKOL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJA7QWWZWMY4AQFR35EA7S3CFVUTOQYG/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1924","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1924"],"published_time":"2024-04-25T15:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25569","summary":"An out-of-bounds read vulnerability exists in the RAWCodec::DecodeBytes functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted DICOM file can lead to an out-of-bounds read. An attacker can provide a malicious file to trigger this vulnerability.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00079,"ranking_epss":0.2341,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZJ4IG7EXMSMPHTK5ZFASCW6MHSOVZOE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5HXUKUJ7SG3TK456SGUWVZ4Z5D7JKOL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJA7QWWZWMY4AQFR35EA7S3CFVUTOQYG/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1944","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZJ4IG7EXMSMPHTK5ZFASCW6MHSOVZOE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5HXUKUJ7SG3TK456SGUWVZ4Z5D7JKOL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJA7QWWZWMY4AQFR35EA7S3CFVUTOQYG/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1944","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1944"],"published_time":"2024-04-25T15:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-22373","summary":"An out-of-bounds write vulnerability exists in the JPEG2000Codec::DecodeByStreamsCommon functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted DICOM file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43596,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZJ4IG7EXMSMPHTK5ZFASCW6MHSOVZOE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5HXUKUJ7SG3TK456SGUWVZ4Z5D7JKOL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJA7QWWZWMY4AQFR35EA7S3CFVUTOQYG/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1935","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZJ4IG7EXMSMPHTK5ZFASCW6MHSOVZOE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5HXUKUJ7SG3TK456SGUWVZ4Z5D7JKOL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJA7QWWZWMY4AQFR35EA7S3CFVUTOQYG/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1935","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1935"],"published_time":"2024-04-25T15:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32662","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00319,"ranking_epss":0.55038,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://oss-fuzz.com/testcase-detail/4985227207311360","https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://oss-fuzz.com/testcase-detail/4985227207311360"],"published_time":"2024-04-23T21:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32659","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workarounds are available.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00398,"ranking_epss":0.60661,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/6430945ce003a5e24d454d8566f54aae1b6b617b","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jgr-7r33-x87w","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://oss-fuzz.com/testcase-detail/6156779722440704","https://github.com/FreeRDP/FreeRDP/commit/6430945ce003a5e24d454d8566f54aae1b6b617b","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jgr-7r33-x87w","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://oss-fuzz.com/testcase-detail/6156779722440704"],"published_time":"2024-04-23T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32660","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending invalid huge allocation size. Version 3.5.1 contains a patch for the issue. No known workarounds are available.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00415,"ranking_epss":0.61722,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/5e5d27cf310e4c10b854be7667bfb7a5d774eb47","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxv6-2cw6-m3mx","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://oss-fuzz.com/testcase-detail/5559242514825216","https://github.com/FreeRDP/FreeRDP/commit/5e5d27cf310e4c10b854be7667bfb7a5d774eb47","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxv6-2cw6-m3mx","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://oss-fuzz.com/testcase-detail/5559242514825216"],"published_time":"2024-04-23T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32661","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00575,"ranking_epss":0.6881,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/71e463e31b4d69f4022d36bfc814592f56600793","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-p5m5-342g-pv9m","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://github.com/FreeRDP/FreeRDP/commit/71e463e31b4d69f4022d36bfc814592f56600793","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-p5m5-342g-pv9m","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/"],"published_time":"2024-04-23T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32658","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. Version 3.5.1 contains a patch for the issue. No known workarounds are available.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01726,"ranking_epss":0.82462,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/1a755d898ddc028cc818d0dd9d49d5acff4c44bf","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vpv3-m3m9-4c2v","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://oss-fuzz.com/testcase-detail/4852534033317888","https://oss-fuzz.com/testcase-detail/6196819496337408","https://github.com/FreeRDP/FreeRDP/commit/1a755d898ddc028cc818d0dd9d49d5acff4c44bf","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vpv3-m3m9-4c2v","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://oss-fuzz.com/testcase-detail/4852534033317888","https://oss-fuzz.com/testcase-detail/6196819496337408"],"published_time":"2024-04-23T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31208","summary":"Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, sharing a room with Synapse instances before 1.105.1, can dispatch specially crafted events to exploit a weakness in the V2 state resolution algorithm. This can induce high CPU consumption and accumulate excessive data in the database of such instances, resulting in a denial of service. Servers in private federations, or those that do not federate, are not affected. Server administrators should upgrade to 1.105.1 or later. Some workarounds are available. One can ban the malicious users or ACL block servers from the rooms and/or leave the room and purge the room using the admin API.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02302,"ranking_epss":0.84765,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/element-hq/synapse/commit/55b0aa847a61774b6a3acdc4b177a20dc019f01a","https://github.com/element-hq/synapse/releases/tag/v1.105.1","https://github.com/element-hq/synapse/security/advisories/GHSA-3h7q-rfh9-xm4v","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6FCCO4ODTZ3FDS7TMW76PKOSEL2TQVB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RR53FNHV446CB37TP45GZ6F6HZLZCK3K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSF4NJJSTSQRJQ47PLYYSCFYKJBP7DET/","https://github.com/element-hq/synapse/commit/55b0aa847a61774b6a3acdc4b177a20dc019f01a","https://github.com/element-hq/synapse/releases/tag/v1.105.1","https://github.com/element-hq/synapse/security/advisories/GHSA-3h7q-rfh9-xm4v","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6FCCO4ODTZ3FDS7TMW76PKOSEL2TQVB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RR53FNHV446CB37TP45GZ6F6HZLZCK3K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSF4NJJSTSQRJQ47PLYYSCFYKJBP7DET/"],"published_time":"2024-04-23T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26922","summary":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: validate the parameters of bo mapping operations more clearly\n\nVerify the parameters of\namdgpu_vm_bo_(map/replace_map/clearing_mappings) in one common place.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00011,"ranking_epss":0.01265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/stable/c/1fd7db5c16028dc07b2ceec190f2e895dddb532d","https://git.kernel.org/stable/c/212e3baccdb1939606420d88f7f52d346b49a284","https://git.kernel.org/stable/c/6fef2d4c00b5b8561ad68dd2b68173f5c6af1e75","https://git.kernel.org/stable/c/8b12fc7b032633539acdf7864888b0ebd49e90f2","https://git.kernel.org/stable/c/b1f04b9b1c5317f562a455384c5f7473e46bdbaa","https://git.kernel.org/stable/c/d4da6b084f1c5625937d49bb6722c5b4aef11b8d","https://git.kernel.org/stable/c/ef13eeca7c79136bc38e21eb67322c1cbd5c40ee","https://git.kernel.org/stable/c/f68039375d4d6d67303674c0ab2d06b7295c0ec9","https://git.kernel.org/stable/c/1fd7db5c16028dc07b2ceec190f2e895dddb532d","https://git.kernel.org/stable/c/212e3baccdb1939606420d88f7f52d346b49a284","https://git.kernel.org/stable/c/6fef2d4c00b5b8561ad68dd2b68173f5c6af1e75","https://git.kernel.org/stable/c/8b12fc7b032633539acdf7864888b0ebd49e90f2","https://git.kernel.org/stable/c/b1f04b9b1c5317f562a455384c5f7473e46bdbaa","https://git.kernel.org/stable/c/d4da6b084f1c5625937d49bb6722c5b4aef11b8d","https://git.kernel.org/stable/c/ef13eeca7c79136bc38e21eb67322c1cbd5c40ee","https://git.kernel.org/stable/c/f68039375d4d6d67303674c0ab2d06b7295c0ec9","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"],"published_time":"2024-04-23T13:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32459","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.1095,"ranking_epss":0.93433,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cp4q-p737-rmw9","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cp4q-p737-rmw9","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/"],"published_time":"2024-04-22T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32460","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01466,"ranking_epss":0.80928,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4rr8-gr65-vqrr","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4rr8-gr65-vqrr","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/"],"published_time":"2024-04-22T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32039","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use `/gfx` options (e.g. deactivate with `/bpp:32` or `/rfx` as it is on by default).","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01466,"ranking_epss":0.80928,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5h8-7j42-j4r9","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5h8-7j42-j4r9","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/"],"published_time":"2024-04-22T21:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32040","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`).","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01466,"ranking_epss":0.80928,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-23c5-cp23-h2h5","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-23c5-cp23-h2h5","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/"],"published_time":"2024-04-22T21:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32041","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00434,"ranking_epss":0.62875,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5r4p-mfx2-m44r","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5r4p-mfx2-m44r","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/"],"published_time":"2024-04-22T21:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32458","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support).","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01466,"ranking_epss":0.80928,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vvr6-h646-mp4p","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/","https://github.com/FreeRDP/FreeRDP/pull/10077","https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6","https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vvr6-h646-mp4p","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/"],"published_time":"2024-04-22T21:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-50008","summary":"FFmpeg v.n6.1-3-g466799d4f5 allows memory consumption when using the colorcorrect filter, in the av_malloc function in libavutil/mem.c:105:9 component.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08602,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FFmpeg/FFmpeg/commit/5f87a68cf70dafeab2fb89b42e41a4c29053b89b","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10701","https://github.com/FFmpeg/FFmpeg/commit/5f87a68cf70dafeab2fb89b42e41a4c29053b89b","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10701"],"published_time":"2024-04-19T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-50009","summary":"FFmpeg v.n6.1-3-g466799d4f5 allows a heap-based buffer overflow via the ff_gaussian_blur_8 function in libavfilter/edge_template.c:116:5 component.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.0002,"ranking_epss":0.05201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://ffmpeg.org/","https://github.com/FFmpeg/FFmpeg","https://github.com/FFmpeg/FFmpeg/commit/162b4c60c8f72be2e93b759f3b1e14652b70b3ba","https://github.com/FFmpeg/FFmpeg/commit/c443658d26d2b8e19901f9507a890e0efca79056","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10699","https://ffmpeg.org/","https://github.com/FFmpeg/FFmpeg","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10699"],"published_time":"2024-04-19T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-50010","summary":"FFmpeg v.n6.1-3-g466799d4f5 allows a buffer over-read at ff_gradfun_blur_line_movdqa_sse2, as demonstrated by a call to the set_encoder_id function in /fftools/ffmpeg_enc.c component.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11815,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://ffmpeg.org/","https://git.ffmpeg.org/gitweb/ffmpeg.git/blobdiff/ab0fdaedd1e7224f7e84ea22fcbfaa4ca75a6c06..e4d2666bdc3dbd177a81bbf428654a5f2fa3787a:/libavfilter/vf_gradfun.c","https://github.com/FFmpeg/FFmpeg/commit/e4d2666bdc3dbd177a81bbf428654a5f2fa3787a","https://github.com/FFmpeg/FFmpeg/commit/e809c23786fe297797198a7b9f5d3392d581daf1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10702","https://ffmpeg.org/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10702"],"published_time":"2024-04-19T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-51791","summary":"Buffer Overflow vulenrability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavcodec/jpegxl_parser.c in gen_alias_map.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11202,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://ffmpeg.org/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10738","https://ffmpeg.org/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10738"],"published_time":"2024-04-19T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-51795","summary":"Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavfilter/avf_showspectrum.c:1789:52 component in showspectrumpic_request_frame","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00077,"ranking_epss":0.22879,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://ffmpeg.org/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10749","https://ffmpeg.org/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10749"],"published_time":"2024-04-19T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-51796","summary":"Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavfilter/f_reverse.c:269:26 in areverse_request_frame.","cvss":3.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.6,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07335,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://ffmpeg.org/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10753","https://ffmpeg.org/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10753"],"published_time":"2024-04-19T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-51797","summary":"Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavfilter/avf_showwaves.c:722:24 in showwaves_filter_frame","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11514,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://ffmpeg.org/","https://github.com/FFmpeg/FFmpeg","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10756","https://ffmpeg.org/","https://github.com/FFmpeg/FFmpeg","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10756"],"published_time":"2024-04-19T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-51798","summary":"Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via a floating point exception (FPE) error at libavfilter/vf_minterpolate.c:1078:60 in interpolate.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13824,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://ffmpeg.org/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10758","https://ffmpeg.org/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10758"],"published_time":"2024-04-19T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-49501","summary":"Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the config_eq_output function in the libavfilter/asrc_afirsrc.c:495:30 component.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00033,"ranking_epss":0.0948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FFmpeg/FFmpeg","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10686","https://trac.ffmpeg.org/ticket/10686#no1","https://github.com/FFmpeg/FFmpeg","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10686","https://trac.ffmpeg.org/ticket/10686#no1"],"published_time":"2024-04-19T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-49502","summary":"Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the ff_bwdif_filter_intra_c function in the libavfilter/bwdifdsp.c:125:5 component.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00246,"ranking_epss":0.4795,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FFmpeg/FFmpeg","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10688","https://github.com/FFmpeg/FFmpeg","https://lists.debian.org/debian-lts-announce/2024/10/msg00019.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10688"],"published_time":"2024-04-19T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-50007","summary":"FFmpeg v.n6.1-3-g466799d4f5 allows an attacker to trigger use of a parameter of negative size in the av_samples_set_silence function in thelibavutil/samplefmt.c:260:9 component.","cvss":4.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.0,"cvss_v4":null,"epss":0.00019,"ranking_epss":0.04894,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FFmpeg/FFmpeg/commit/b1942734c7cbcdc9034034373abcc9ecb9644c47","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10700","https://github.com/FFmpeg/FFmpeg/commit/b1942734c7cbcdc9034034373abcc9ecb9644c47","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10700"],"published_time":"2024-04-19T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-22640","summary":"TCPDF version <=6.6.5 is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing an untrusted HTML page with a crafted color.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01189,"ranking_epss":0.78842,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/tecnickcom/TCPDF","https://github.com/zunak/CVE-2024-22640","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LIB3R2WB7XPW2I4PGVMZ3VLFLRHOK4RB/","https://github.com/tecnickcom/TCPDF","https://github.com/zunak/CVE-2024-22640","https://lists.debian.org/debian-lts-announce/2025/06/msg00004.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LIB3R2WB7XPW2I4PGVMZ3VLFLRHOK4RB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LIB3R2WB7XPW2I4PGVMZ3VLFLRHOK4RB/"],"published_time":"2024-04-19T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3758","summary":"A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08004,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:1919","https://access.redhat.com/errata/RHSA-2024:1920","https://access.redhat.com/errata/RHSA-2024:1921","https://access.redhat.com/errata/RHSA-2024:1922","https://access.redhat.com/errata/RHSA-2024:2571","https://access.redhat.com/errata/RHSA-2024:3270","https://access.redhat.com/security/cve/CVE-2023-3758","https://bugzilla.redhat.com/show_bug.cgi?id=2223762","https://github.com/SSSD/sssd/pull/7302","https://access.redhat.com/errata/RHSA-2024:1919","https://access.redhat.com/errata/RHSA-2024:1920","https://access.redhat.com/errata/RHSA-2024:1921","https://access.redhat.com/errata/RHSA-2024:1922","https://access.redhat.com/errata/RHSA-2024:2571","https://access.redhat.com/errata/RHSA-2024:3270","https://access.redhat.com/security/cve/CVE-2023-3758","https://bugzilla.redhat.com/show_bug.cgi?id=2223762","https://github.com/SSSD/sssd/pull/7302","https://lists.debian.org/debian-lts-announce/2025/02/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RV3HIZI3SURBUQKSOOL3XE64OOBQ2HTK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XEP62IDS7A55D5UHM6GH7QZ7SQFOAPVF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMORAO2BDDA5YX4ZLMXDZ7SM6KU47SY5/"],"published_time":"2024-04-18T19:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-32462","summary":"Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak require at least that version of bubblewrap. xdg-desktop-portal version 1.18.4 will mitigate this vulnerability by only allowing Flatpak apps to create .desktop files for commands that do not start with --. The vulnerability is patched in 1.15.8, 1.10.9, 1.12.9, and 1.14.6.","cvss":8.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.4,"cvss_v4":null,"epss":0.00207,"ranking_epss":0.43185,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/04/18/5","https://github.com/flatpak/flatpak/commit/72016e3fce8fcbeab707daf4f1a02b931fcc004d","https://github.com/flatpak/flatpak/commit/81abe2a37d363f5099c3d0bdcd0caad6efc5bf97","https://github.com/flatpak/flatpak/commit/b7c1a558e58aaeb1d007d29529bbb270dc4ff11e","https://github.com/flatpak/flatpak/commit/bbab7ed1e672356d1a78b422462b210e8e875931","https://github.com/flatpak/flatpak/security/advisories/GHSA-phv6-cpc2-2fgj","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IB6VQAF5S2YOBULDHPUKPOEIKONOP5KO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNSCFJVMAQK5AF55JBN7OSJP3CREDBD/","http://www.openwall.com/lists/oss-security/2024/04/18/5","https://github.com/flatpak/flatpak/commit/72016e3fce8fcbeab707daf4f1a02b931fcc004d","https://github.com/flatpak/flatpak/commit/81abe2a37d363f5099c3d0bdcd0caad6efc5bf97","https://github.com/flatpak/flatpak/commit/b7c1a558e58aaeb1d007d29529bbb270dc4ff11e","https://github.com/flatpak/flatpak/commit/bbab7ed1e672356d1a78b422462b210e8e875931","https://github.com/flatpak/flatpak/security/advisories/GHSA-phv6-cpc2-2fgj","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IB6VQAF5S2YOBULDHPUKPOEIKONOP5KO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNSCFJVMAQK5AF55JBN7OSJP3CREDBD/"],"published_time":"2024-04-18T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27306","summary":"aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. A XSS vulnerability exists on index pages for static file handling. This vulnerability is fixed in 3.9.4. We have always recommended using a reverse proxy server (e.g. nginx) for serving static files. Users following the recommendation are unaffected. Other users can disable `show_index` if unable to upgrade.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00749,"ranking_epss":0.73167,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/aio-libs/aiohttp/commit/28335525d1eac015a7e7584137678cbb6ff19397","https://github.com/aio-libs/aiohttp/pull/8319","https://github.com/aio-libs/aiohttp/security/advisories/GHSA-7gpw-8wmc-pm8g","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EXRGTN2WG7VZLUZ7WOXU5GQJKCPPHKP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWEI6NIHZ3G7DURDZVMRK7ZEFC2BTD3U/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZIVBMPEY7WWOFMC3CWXFBRQPFECV4SW3/","https://github.com/aio-libs/aiohttp/commit/28335525d1eac015a7e7584137678cbb6ff19397","https://github.com/aio-libs/aiohttp/pull/8319","https://github.com/aio-libs/aiohttp/security/advisories/GHSA-7gpw-8wmc-pm8g","https://lists.debian.org/debian-lts-announce/2025/02/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EXRGTN2WG7VZLUZ7WOXU5GQJKCPPHKP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWEI6NIHZ3G7DURDZVMRK7ZEFC2BTD3U/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZIVBMPEY7WWOFMC3CWXFBRQPFECV4SW3/"],"published_time":"2024-04-18T15:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4233","summary":"A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the sms_decode_address_field() function during the SMS PDU decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base station, or just SMS.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00169,"ranking_epss":0.38166,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2255396","https://bugzilla.redhat.com/show_bug.cgi?id=2255396","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBTPKR3LYTTLROPXF77FL4SPLXVHNC4T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VG6FHQITWUNHBDGPXUQ77SZK5O5BYIBZ/"],"published_time":"2024-04-17T23:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4234","summary":"A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decode_submit_report() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base station, or just SMS. There is a bound check for this memcpy length in decode_submit(), but it was forgotten in decode_submit_report().","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00145,"ranking_epss":0.34871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2255399","https://bugzilla.redhat.com/show_bug.cgi?id=2255399","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBTPKR3LYTTLROPXF77FL4SPLXVHNC4T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VG6FHQITWUNHBDGPXUQ77SZK5O5BYIBZ/"],"published_time":"2024-04-17T23:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4235","summary":"A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decode_deliver_report() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base station, or just SMS. There is a bound check for this memcpy length in decode_submit(), but it was forgotten in decode_deliver_report().","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00138,"ranking_epss":0.33974,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2255402","https://bugzilla.redhat.com/show_bug.cgi?id=2255402","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLAWJAAS3HDI2KMCZXF4DMR3Y4BQNMKO/"],"published_time":"2024-04-17T23:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4232","summary":"A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decode_status_report() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base station, or just SMS. There is a bound check for this memcpy length in decode_submit(), but it was forgotten in decode_status_report().","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00127,"ranking_epss":0.32089,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2255394","https://bugzilla.redhat.com/show_bug.cgi?id=2255394","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLAWJAAS3HDI2KMCZXF4DMR3Y4BQNMKO/"],"published_time":"2024-04-17T23:15:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31585","summary":"FFmpeg version n5.1 to n6.1 was discovered to contain an Off-by-one Error vulnerability in libavfilter/avf_showspectrum.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06117,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gist.github.com/1047524396/dc2c64ffe0c3934a6176bcd2c5cf5656","https://git.ffmpeg.org/gitweb/ffmpeg.git/blobdiff/aec67d3d7d2895bfea61aa1358d9d8e956f8615c..ab0fdaedd1e7224f7e84ea22fcbfaa4ca75a6c06:/libavfilter/avf_showspectrum.c","https://git.ffmpeg.org/gitweb/ffmpeg.git/blobdiff/bf2d7b20ea1c7d15dcbaedd479f40295e5c83430..3061bf668feffc7c1f0b244205167b3b86da8015:/libavfilter/avf_showspectrum.c","https://github.com/FFmpeg/FFmpeg/commit/3061bf668feffc7c1f0b244205167b3b86da8015","https://github.com/FFmpeg/FFmpeg/commit/81df787b53eb5c6433731f6eaaf7f2a94d8a8c80","https://github.com/ffmpeg/ffmpeg/commit/ab0fdaedd1e7224f7e84ea22fcbfaa4ca75a6c06","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://gist.github.com/1047524396/dc2c64ffe0c3934a6176bcd2c5cf5656","https://github.com/FFmpeg/FFmpeg/commit/81df787b53eb5c6433731f6eaaf7f2a94d8a8c80","https://github.com/ffmpeg/ffmpeg/commit/ab0fdaedd1e7224f7e84ea22fcbfaa4ca75a6c06","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"],"published_time":"2024-04-17T19:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31031","summary":"An issue in `coap_pdu.c` in libcoap 4.3.4 allows attackers to cause undefined behavior via a sequence of messages leading to unsigned integer overflow.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00088,"ranking_epss":0.25189,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/obgm/libcoap/issues/1351","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LPENEJBV3KSASIYKNZAKXDAH7Q66KPYG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUL7QDYFGEIJVO2ZSG4O5HEAWR6PFC52/","https://github.com/obgm/libcoap/issues/1351","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LPENEJBV3KSASIYKNZAKXDAH7Q66KPYG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUL7QDYFGEIJVO2ZSG4O5HEAWR6PFC52/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPENEJBV3KSASIYKNZAKXDAH7Q66KPYG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUL7QDYFGEIJVO2ZSG4O5HEAWR6PFC52/"],"published_time":"2024-04-17T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31581","summary":"FFmpeg version n6.1 was discovered to contain an improper validation of array index vulnerability in libavcodec/cbs_h266_syntax_template.c. This vulnerability allows attackers to cause undefined behavior within the application.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00217,"ranking_epss":0.44299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gist.github.com/1047524396/a7e9273e12553775826784035333cdd8","https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/cbs_h266_syntax_template.c#L2048","https://github.com/ffmpeg/ffmpeg/commit/ce0c178a408d43e71085c28a47d50dc939b60196","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://gist.github.com/1047524396/a7e9273e12553775826784035333cdd8","https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/cbs_h266_syntax_template.c#L2048","https://github.com/ffmpeg/ffmpeg/commit/ce0c178a408d43e71085c28a47d50dc939b60196","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"],"published_time":"2024-04-17T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31582","summary":"FFmpeg version n6.1 was discovered to contain a heap buffer overflow vulnerability in the draw_block_rectangle function of libavfilter/vf_codecview.c. This vulnerability allows attackers to cause undefined behavior or a Denial of Service (DoS) via crafted input.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06174,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gist.github.com/1047524396/b47d5efe3bc420fb91dbb77c73c0fff3","https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavfilter/vf_codecview.c#L220","https://github.com/ffmpeg/ffmpeg/commit/99debe5f823f45a482e1dc08de35879aa9c74bd2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://gist.github.com/1047524396/b47d5efe3bc420fb91dbb77c73c0fff3","https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavfilter/vf_codecview.c#L220","https://github.com/ffmpeg/ffmpeg/commit/99debe5f823f45a482e1dc08de35879aa9c74bd2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"],"published_time":"2024-04-17T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3914","summary":"Use after free in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00258,"ranking_epss":0.49221,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/330759272","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/330759272","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"],"published_time":"2024-04-17T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31578","summary":"FFmpeg version n6.1.1 was discovered to contain a heap use-after-free via the av_hwframe_ctx_init function.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00323,"ranking_epss":0.55417,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gist.github.com/1047524396/45400cce5859d78dcd3a62010df8d179","https://github.com/ffmpeg/ffmpeg/commit/3bb00c0a420c3ce83c6fafee30270d69622ccad7","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://gist.github.com/1047524396/45400cce5859d78dcd3a62010df8d179","https://github.com/ffmpeg/ffmpeg/commit/3bb00c0a420c3ce83c6fafee30270d69622ccad7","https://lists.debian.org/debian-lts-announce/2024/10/msg00019.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"],"published_time":"2024-04-17T14:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3832","summary":"Object corruption in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05754,"ranking_epss":0.90476,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/331358160","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/331358160","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"],"published_time":"2024-04-17T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3833","summary":"Object corruption in WebAssembly in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04149,"ranking_epss":0.88676,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/331383939","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/331383939","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"],"published_time":"2024-04-17T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3840","summary":"Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00181,"ranking_epss":0.39862,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/41493458","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/41493458","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"],"published_time":"2024-04-17T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3841","summary":"Insufficient data validation in Browser Switcher in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to inject scripts or HTML into a privileged page via a malicious file. (Chromium security severity: Medium)","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00311,"ranking_epss":0.54377,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/330376742","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/330376742","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"],"published_time":"2024-04-17T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3843","summary":"Insufficient data validation in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00534,"ranking_epss":0.67443,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/41486690","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/41486690","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"],"published_time":"2024-04-17T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3844","summary":"Inappropriate implementation in Extensions in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00826,"ranking_epss":0.74516,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/40058873","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/40058873","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"],"published_time":"2024-04-17T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3845","summary":"Inappropriate implementation in Networks in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass mixed content policy via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00259,"ranking_epss":0.49301,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/323583084","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/323583084","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"],"published_time":"2024-04-17T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3846","summary":"Inappropriate implementation in Prompts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00901,"ranking_epss":0.75716,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/40064754","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/40064754","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"],"published_time":"2024-04-17T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3847","summary":"Insufficient policy enforcement in WebUI in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00129,"ranking_epss":0.32295,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/328690293","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/328690293","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"],"published_time":"2024-04-17T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21096","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Client: mysqldump).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data as well as  unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00121,"ranking_epss":0.31136,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE/","https://security.netapp.com/advisory/ntap-20240426-0013/","https://www.oracle.com/security-alerts/cpuapr2024.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE/","https://security.netapp.com/advisory/ntap-20240426-0013/","https://www.oracle.com/security-alerts/cpuapr2024.html"],"published_time":"2024-04-16T22:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24809","summary":"net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-only credentials can use a malformed OID in a `GET-NEXT` to the `nsVacmAccessTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00135,"ranking_epss":0.33229,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://bugzilla.redhat.com/show_bug.cgi?id=2105242","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209","https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://bugzilla.redhat.com/show_bug.cgi?id=2105242","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209"],"published_time":"2024-04-16T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24810","summary":"net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a SET to the nsVacmAccessTable to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00187,"ranking_epss":0.40511,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://bugzilla.redhat.com/show_bug.cgi?id=2105241","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209","https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://bugzilla.redhat.com/show_bug.cgi?id=2105241","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209"],"published_time":"2024-04-16T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24806","summary":"net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00212,"ranking_epss":0.43778,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209","https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209"],"published_time":"2024-04-16T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24807","summary":"net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a malformed OID in a SET request to `SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable` can cause an out-of-bounds memory access. A user with read-write credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00501,"ranking_epss":0.6603,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://bugzilla.redhat.com/show_bug.cgi?id=2105239","https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209","https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://bugzilla.redhat.com/show_bug.cgi?id=2105239","https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209"],"published_time":"2024-04-16T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24808","summary":"net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a `SET` request to `NET-SNMP-AGENT-MIB::nsLogTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00195,"ranking_epss":0.41484,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://bugzilla.redhat.com/show_bug.cgi?id=2105240","https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209","https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://bugzilla.redhat.com/show_bug.cgi?id=2105240","https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209"],"published_time":"2024-04-16T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24805","summary":"net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of             `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.\n","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00497,"ranking_epss":0.65882,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://bugzilla.redhat.com/show_bug.cgi?id=2105238","https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209","https://bugzilla.redhat.com/show_bug.cgi?id=2103225","https://bugzilla.redhat.com/show_bug.cgi?id=2105238","https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937","https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775","https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/","https://security.gentoo.org/glsa/202210-29","https://www.debian.org/security/2022/dsa-5209"],"published_time":"2024-04-16T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31497","summary":"In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable because they are stored in a public Git service that supports use of SSH for commit signing, and the signatures were made by Pageant through an agent-forwarding mechanism. In other words, an adversary may already have enough signature information to compromise a victim's private key, even if there is no further use of vulnerable PuTTY versions. After a key compromise, an adversary may be able to conduct supply-chain attacks on software maintained in Git. A second, independent scenario is that the adversary is an operator of an SSH server to which the victim authenticates (for remote login or file copy), even though this server is not fully trusted by the victim, and the victim uses the same private key for SSH connections to other services operated by other entities. Here, the rogue server operator (who would otherwise have no way to determine the victim's private key) can derive the victim's private key, and then use it for unauthorized access to those other services. If the other services include Git services, then again it may be possible to conduct supply-chain attacks on software maintained in Git. This also affects, for example, FileZilla before 3.67.0, WinSCP before 6.3.3, TortoiseGit before 2.15.0.1, and TortoiseSVN through 1.14.6.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.19221,"ranking_epss":0.95374,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/04/15/6","https://bugzilla.redhat.com/show_bug.cgi?id=2275183","https://bugzilla.suse.com/show_bug.cgi?id=1222864","https://docs.ccv.brown.edu/oscar/connecting-to-oscar/ssh/ssh-agent-forwarding/key-generation-and-agent-forwarding-with-putty","https://filezilla-project.org/versions.php","https://git.tartarus.org/?h=c193fe9848f50a88a4089aac647fecc31ae96d27&p=simon/putty.git","https://github.com/advisories/GHSA-6p4c-r453-8743","https://github.com/daedalus/BreakingECDSAwithLLL","https://lists.debian.org/debian-lts-announce/2024/06/msg00014.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZS3B37GNGWOOV7QU7B7JFK76U4TOP4V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMHILY2K7HQGQRHOC375KRRG2M6625RD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PUOTQVGC4DISVHQGSPUYGXO6TLDK65LA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFDZBV7ZCAZ6AH3VCQ34SSY7L3J7VZXZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMJH7M663BVO3SY6MFAW2FAZWLLXAPRQ/","https://news.ycombinator.com/item?id=40044665","https://security-tracker.debian.org/tracker/CVE-2024-31497","https://securityonline.info/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required/","https://tartarus.org/~simon/putty-snapshots/htmldoc/Chapter9.html#pageant-forward","https://tortoisegit.org","https://twitter.com/CCBalert/status/1780229237569470549","https://twitter.com/lambdafu/status/1779969509522133272","https://winscp.net/eng/news.php","https://www.bleepingcomputer.com/news/security/putty-ssh-client-flaw-allows-recovery-of-cryptographic-private-keys/","https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html","https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html","https://www.openwall.com/lists/oss-security/2024/04/15/6","https://www.reddit.com/r/sysadmin/comments/1c4wmoj/putty_vulnerability_affecting_v068_to_v08/","http://www.openwall.com/lists/oss-security/2024/04/15/6","https://bugzilla.redhat.com/show_bug.cgi?id=2275183","https://bugzilla.suse.com/show_bug.cgi?id=1222864","https://docs.ccv.brown.edu/oscar/connecting-to-oscar/ssh/ssh-agent-forwarding/key-generation-and-agent-forwarding-with-putty","https://filezilla-project.org/versions.php","https://git.tartarus.org/?h=c193fe9848f50a88a4089aac647fecc31ae96d27&p=simon/putty.git","https://github.com/advisories/GHSA-6p4c-r453-8743","https://github.com/daedalus/BreakingECDSAwithLLL","https://lists.debian.org/debian-lts-announce/2024/06/msg00014.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZS3B37GNGWOOV7QU7B7JFK76U4TOP4V/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMHILY2K7HQGQRHOC375KRRG2M6625RD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PUOTQVGC4DISVHQGSPUYGXO6TLDK65LA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFDZBV7ZCAZ6AH3VCQ34SSY7L3J7VZXZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMJH7M663BVO3SY6MFAW2FAZWLLXAPRQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZS3B37GNGWOOV7QU7B7JFK76U4TOP4V/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHILY2K7HQGQRHOC375KRRG2M6625RD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUOTQVGC4DISVHQGSPUYGXO6TLDK65LA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WMJH7M663BVO3SY6MFAW2FAZWLLXAPRQ/","https://news.ycombinator.com/item?id=40044665","https://security-tracker.debian.org/tracker/CVE-2024-31497","https://securityonline.info/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required/","https://tartarus.org/~simon/putty-snapshots/htmldoc/Chapter9.html#pageant-forward","https://tortoisegit.org","https://twitter.com/CCBalert/status/1780229237569470549","https://twitter.com/lambdafu/status/1779969509522133272","https://winscp.net/eng/news.php","https://www.bleepingcomputer.com/news/security/putty-ssh-client-flaw-allows-recovery-of-cryptographic-private-keys/","https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html","https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html","https://www.openwall.com/lists/oss-security/2024/04/15/6","https://www.reddit.com/r/sysadmin/comments/1c4wmoj/putty_vulnerability_affecting_v068_to_v08/","https://www.vicarius.io/vsociety/posts/understanding-a-critical-vulnerability-in-putty-biased-ecdsa-nonce-generation-revealing-nist-p-521-private-keys-cve-2024-31497"],"published_time":"2024-04-15T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3772","summary":"Regular expression denial of service in Pydanic < 2.4.0, < 1.10.13 allows remote attackers to cause denial of service via a crafted email string.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.0028,"ranking_epss":0.51483,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pydantic/pydantic/pull/7360","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JBZLMSH4GAZOVBMT2JUO2LXHY7M2ALI/","https://github.com/pydantic/pydantic/pull/7360","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JBZLMSH4GAZOVBMT2JUO2LXHY7M2ALI/"],"published_time":"2024-04-15T03:16:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-49528","summary":"Buffer Overflow vulnerability in FFmpeg version n6.1-3-g466799d4f5, allows a local attacker to execute arbitrary code and cause a denial of service (DoS) via the af_dialoguenhance.c:261:5 in the de_stereo component.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06835,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10691","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","https://trac.ffmpeg.org/ticket/10691"],"published_time":"2024-04-12T06:15:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29483","summary":"eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a \"TuDoor\" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.04954,"ranking_epss":0.89671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/eventlet/eventlet/issues/913","https://github.com/eventlet/eventlet/releases/tag/v0.35.2","https://github.com/rthalley/dnspython/issues/1045","https://github.com/rthalley/dnspython/releases/tag/v2.6.0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF/","https://security.netapp.com/advisory/ntap-20240510-0001/","https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713","https://www.dnspython.org/","https://github.com/eventlet/eventlet/issues/913","https://github.com/eventlet/eventlet/releases/tag/v0.35.2","https://github.com/rthalley/dnspython/issues/1045","https://github.com/rthalley/dnspython/releases/tag/v2.6.0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/","https://security.netapp.com/advisory/ntap-20240510-0001/","https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713","https://www.dnspython.org/"],"published_time":"2024-04-11T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3157","summary":"Out of bounds memory access in Compositing in Google Chrome prior to 123.0.6312.122 allowed a remote attacker who had compromised the GPU process to potentially perform a sandbox escape via specific UI gestures. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00539,"ranking_epss":0.67621,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/331237485","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/331237485","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/"],"published_time":"2024-04-10T19:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3515","summary":"Use after free in Dawn in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00183,"ranking_epss":0.40059,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/331123811","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/331123811","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/"],"published_time":"2024-04-10T19:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3516","summary":"Heap buffer overflow in ANGLE in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00563,"ranking_epss":0.68409,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/328859176","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/","https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/328859176","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/"],"published_time":"2024-04-10T19:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-31309","summary":"HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server.  Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are affected.\n\nUsers can set a new setting (proxy.config.http2.max_continuation_frames_per_minute) to limit the number of CONTINUATION frames per minute.  ATS does have a fixed amount of memory a request can use and ATS adheres to these limits in previous releases.\nUsers are recommended to upgrade to versions 8.1.10 or 9.2.4 which fixes the issue.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.10847,"ranking_epss":0.93394,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/04/03/16","http://www.openwall.com/lists/oss-security/2024/04/10/7","https://lists.apache.org/thread/f9qh3g3jvy153wh82pz4onrfj1wh13kc","https://lists.debian.org/debian-lts-announce/2024/04/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO/","http://www.openwall.com/lists/oss-security/2024/04/03/16","http://www.openwall.com/lists/oss-security/2024/04/10/7","https://lists.apache.org/thread/f9qh3g3jvy153wh82pz4onrfj1wh13kc","https://lists.debian.org/debian-lts-announce/2024/04/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO/","https://www.kb.cert.org/vuls/id/421644"],"published_time":"2024-04-10T12:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2794","summary":"A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decode_deliver() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base station, or just SMS. There is a bound check for this memcpy length in decode_submit(), but it was forgotten in decode_deliver().","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00209,"ranking_epss":0.4335,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2255387","https://bugzilla.redhat.com/show_bug.cgi?id=2255387","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLAWJAAS3HDI2KMCZXF4DMR3Y4BQNMKO/"],"published_time":"2024-04-10T11:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-24576","summary":"Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected.\n\nThe `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument.\n\nOn Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted.\n\nOne exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution.\n\nDue to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an `InvalidInput` error when it cannot safely escape an argument. This error will be emitted when spawning the process.\n\nThe fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.","cvss":10.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":10.0,"cvss_v4":null,"epss":0.79212,"ranking_epss":0.9907,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/04/09/16","https://doc.rust-lang.org/std/io/enum.ErrorKind.html#variant.InvalidInput","https://doc.rust-lang.org/std/os/windows/process/trait.CommandExt.html#tymethod.raw_arg","https://doc.rust-lang.org/std/process/struct.Command.html","https://doc.rust-lang.org/std/process/struct.Command.html#method.arg","https://doc.rust-lang.org/std/process/struct.Command.html#method.args","https://github.com/rust-lang/rust/issues","https://github.com/rust-lang/rust/security/advisories/GHSA-q455-m56c-85mh","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N323QAEEUVTJ354BTVQ7UB6LYXUX2BCL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPH3PF7DVSS2LVIRLW254VWUPVKJN46P/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W7WRFOIAZXYUPGXGR5UEEW7VTTOD4SZ3/","https://www.rust-lang.org/policies/security","http://www.openwall.com/lists/oss-security/2024/04/09/16","https://doc.rust-lang.org/std/io/enum.ErrorKind.html#variant.InvalidInput","https://doc.rust-lang.org/std/os/windows/process/trait.CommandExt.html#tymethod.raw_arg","https://doc.rust-lang.org/std/process/struct.Command.html","https://doc.rust-lang.org/std/process/struct.Command.html#method.arg","https://doc.rust-lang.org/std/process/struct.Command.html#method.args","https://github.com/rust-lang/rust/issues","https://github.com/rust-lang/rust/security/advisories/GHSA-q455-m56c-85mh","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N323QAEEUVTJ354BTVQ7UB6LYXUX2BCL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPH3PF7DVSS2LVIRLW254VWUPVKJN46P/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W7WRFOIAZXYUPGXGR5UEEW7VTTOD4SZ3/","https://www.kb.cert.org/vuls/id/123335","https://www.rust-lang.org/policies/security"],"published_time":"2024-04-09T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26256","summary":"Libarchive Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.4126,"ranking_epss":0.97403,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256","http://www.openwall.com/lists/oss-security/2024/06/04/2","http://www.openwall.com/lists/oss-security/2024/06/05/1","https://github.com/LeSuisse/nixpkgs/commit/81b82a2934521dffef76f7ca305d8d4e22fe7262","https://github.com/libarchive/libarchive/commit/eb7939b24a681a04648a59cdebd386b1e9dc9237.patch","https://github.com/libarchive/libarchive/releases/tag/v3.7.4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWANFZ6NEMXFCALXWI2AFKYBOLONAVFC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWAMR5TY47UKVYMWQXB34CWSBNTRYMBV/","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256","https://www.openwall.com/lists/oss-security/2024/06/04/2"],"published_time":"2024-04-09T17:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38709","summary":"Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.03255,"ranking_epss":0.8715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2024/Jul/18","http://www.openwall.com/lists/oss-security/2024/04/04/3","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/","https://security.netapp.com/advisory/ntap-20240415-0013/","https://support.apple.com/kb/HT214119","http://seclists.org/fulldisclosure/2024/Jul/18","http://www.openwall.com/lists/oss-security/2024/04/04/3","http://www.openwall.com/lists/oss-security/2025/07/10/2","http://www.openwall.com/lists/oss-security/2025/07/10/3","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/","https://security.netapp.com/advisory/ntap-20240415-0013/","https://support.apple.com/kb/HT214119"],"published_time":"2024-04-04T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-24795","summary":"HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.01123,"ranking_epss":0.78295,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://httpd.apache.org/security/vulnerabilities_24.html","http://seclists.org/fulldisclosure/2024/Jul/18","http://www.openwall.com/lists/oss-security/2024/04/04/5","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/","https://security.netapp.com/advisory/ntap-20240415-0013/","https://support.apple.com/kb/HT214119"],"published_time":"2024-04-04T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27316","summary":"HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.89409,"ranking_epss":0.9955,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2024/Jul/18","http://www.openwall.com/lists/oss-security/2024/04/04/4","https://httpd.apache.org/security/vulnerabilities_24.html","https://support.apple.com/kb/HT214119","https://www.openwall.com/lists/oss-security/2024/04/03/16","http://seclists.org/fulldisclosure/2024/Jul/18","http://www.openwall.com/lists/oss-security/2024/04/04/4","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FO73U3SLBYFGIW2YKXOK7RI4D6DJSZ2B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIUBKSCJGPJ6M2U63V6BKFDF725ODLG7/","https://security.netapp.com/advisory/ntap-20240415-0013/","https://support.apple.com/kb/HT214119","https://www.kb.cert.org/vuls/id/421644","https://www.openwall.com/lists/oss-security/2024/04/03/16"],"published_time":"2024-04-04T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30260","summary":"Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici cleared Authorization and Proxy-Authorization headers for `fetch()`, but did not clear them for `undici.request()`. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.","cvss":3.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.9,"cvss_v4":null,"epss":0.00177,"ranking_epss":0.39331,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f","https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75","https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/","https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f","https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75","https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/","https://security.netapp.com/advisory/ntap-20240905-0008/"],"published_time":"2024-04-04T16:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30261","summary":"Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.","cvss":2.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.6,"cvss_v4":null,"epss":0.0006,"ranking_epss":0.18632,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055","https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3","https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672","https://hackerone.com/reports/2377760","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/","https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055","https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3","https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672","https://hackerone.com/reports/2377760","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/","https://security.netapp.com/advisory/ntap-20240905-0008/"],"published_time":"2024-04-04T15:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3116","summary":"pgAdmin <= 8.4 is affected by a  Remote Code Execution (RCE) vulnerability through the validate binary path API. This vulnerability allows attackers to execute arbitrary code on the server hosting PGAdmin, posing a severe risk to the database management system's integrity and the security of the underlying data.","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.90682,"ranking_epss":0.99621,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gist.github.com/aelmokhtar/689a8be7e3bd535ec01992d8ec7b2b98","https://github.com/pgadmin-org/pgadmin4/issues/7326","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIF5T34JTTYRGIN5YPT366BDFG6452A2/","https://gist.github.com/aelmokhtar/689a8be7e3bd535ec01992d8ec7b2b98","https://github.com/pgadmin-org/pgadmin4/issues/7326","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIF5T34JTTYRGIN5YPT366BDFG6452A2/","https://www.vicarius.io/vsociety/posts/remote-code-execution-vulnerability-in-pgadmin-cve-2024-3116"],"published_time":"2024-04-04T15:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-28182","summary":"nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync.  This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.24971,"ranking_epss":0.96178,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/04/03/16","https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0","https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9","https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q","https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/","http://www.openwall.com/lists/oss-security/2024/04/03/16","https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0","https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9","https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q","https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/","https://www.kb.cert.org/vuls/id/421644"],"published_time":"2024-04-04T15:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-3209","summary":"A vulnerability was found in UPX up to 4.2.2. It has been rated as critical. This issue affects the function get_ne64 of the file bele.h. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259055. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.","cvss":5.5,"cvss_version":3.0,"cvss_v2":5.2,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00271,"ranking_epss":0.50584,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://drive.google.com/drive/folders/1qlUXvycOzGJygfkdQB9dGO6VwNRRZoih?usp=sharing","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AE5OZ7YUEVLXVVS6PFP5RELVICQ4K6QK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4DNK3AFPT4KIPTBKGCJ6FC3L7AWI2TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHWZN2NX5W3WYA6ACJ746PAZXXNZETKD/","https://vuldb.com/?ctiid.259055","https://vuldb.com/?id.259055","https://vuldb.com/?submit.304575","https://drive.google.com/drive/folders/1qlUXvycOzGJygfkdQB9dGO6VwNRRZoih?usp=sharing","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AE5OZ7YUEVLXVVS6PFP5RELVICQ4K6QK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4DNK3AFPT4KIPTBKGCJ6FC3L7AWI2TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHWZN2NX5W3WYA6ACJ746PAZXXNZETKD/","https://vuldb.com/?ctiid.259055","https://vuldb.com/?id.259055","https://vuldb.com/?submit.304575"],"published_time":"2024-04-02T23:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-28960","summary":"An issue was discovered in Mbed TLS 2.18.0 through 2.28.x before 2.28.8 and 3.x before 3.6.0, and Mbed Crypto. The PSA Crypto API mishandles shared memory.","cvss":8.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.2,"cvss_v4":null,"epss":0.0015,"ranking_epss":0.35611,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5YE3QRREGJC6K34JD4LZ5P3IALNX4QYY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6UZNBMKYEV2J5DI7R4BQGL472V7X3WJY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NCDU52ZDA7TX3HC5JCU6ZZIJQOPTNBK6/","https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/","https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5YE3QRREGJC6K34JD4LZ5P3IALNX4QYY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6UZNBMKYEV2J5DI7R4BQGL472V7X3WJY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NCDU52ZDA7TX3HC5JCU6ZZIJQOPTNBK6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5YE3QRREGJC6K34JD4LZ5P3IALNX4QYY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6UZNBMKYEV2J5DI7R4BQGL472V7X3WJY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NCDU52ZDA7TX3HC5JCU6ZZIJQOPTNBK6/","https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/"],"published_time":"2024-03-29T06:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2004","summary":"When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled.      curl --proto -all,-http http://curl.se  The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.","cvss":3.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00838,"ranking_epss":0.74729,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2024/Jul/18","http://seclists.org/fulldisclosure/2024/Jul/19","http://seclists.org/fulldisclosure/2024/Jul/20","http://www.openwall.com/lists/oss-security/2024/03/27/1","https://curl.se/docs/CVE-2024-2004.html","https://curl.se/docs/CVE-2024-2004.json","https://hackerone.com/reports/2384833","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/","https://security.netapp.com/advisory/ntap-20240524-0006/","https://support.apple.com/kb/HT214118","https://support.apple.com/kb/HT214119","https://support.apple.com/kb/HT214120","http://seclists.org/fulldisclosure/2024/Jul/18","http://seclists.org/fulldisclosure/2024/Jul/19","http://seclists.org/fulldisclosure/2024/Jul/20","http://www.openwall.com/lists/oss-security/2024/03/27/1","https://curl.se/docs/CVE-2024-2004.html","https://curl.se/docs/CVE-2024-2004.json","https://hackerone.com/reports/2384833","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/","https://security.netapp.com/advisory/ntap-20240524-0006/","https://support.apple.com/kb/HT214118","https://support.apple.com/kb/HT214119","https://support.apple.com/kb/HT214120"],"published_time":"2024-03-27T08:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2398","summary":"When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory.  Further, this error condition fails silently and is therefore not easily detected by an application.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.01962,"ranking_epss":0.83545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2024/Jul/18","http://seclists.org/fulldisclosure/2024/Jul/19","http://seclists.org/fulldisclosure/2024/Jul/20","http://www.openwall.com/lists/oss-security/2024/03/27/3","https://curl.se/docs/CVE-2024-2398.html","https://curl.se/docs/CVE-2024-2398.json","https://hackerone.com/reports/2402845","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/","https://security.netapp.com/advisory/ntap-20240503-0009/","https://support.apple.com/kb/HT214118","https://support.apple.com/kb/HT214119","https://support.apple.com/kb/HT214120","http://seclists.org/fulldisclosure/2024/Jul/18","http://seclists.org/fulldisclosure/2024/Jul/19","http://seclists.org/fulldisclosure/2024/Jul/20","http://www.openwall.com/lists/oss-security/2024/03/27/3","https://curl.se/docs/CVE-2024-2398.html","https://curl.se/docs/CVE-2024-2398.json","https://hackerone.com/reports/2402845","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/","https://security.netapp.com/advisory/ntap-20240503-0009/","https://support.apple.com/kb/HT214118","https://support.apple.com/kb/HT214119","https://support.apple.com/kb/HT214120"],"published_time":"2024-03-27T08:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2883","summary":"Use after free in ANGLE in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00302,"ranking_epss":0.53549,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","https://issues.chromium.org/issues/327807820","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","https://issues.chromium.org/issues/327807820","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"],"published_time":"2024-03-26T21:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2885","summary":"Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00302,"ranking_epss":0.53549,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","https://issues.chromium.org/issues/328958020","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","https://issues.chromium.org/issues/328958020","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"],"published_time":"2024-03-26T21:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2886","summary":"Use after free in WebCodecs in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01317,"ranking_epss":0.79888,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","https://issues.chromium.org/issues/330575496","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","https://issues.chromium.org/issues/330575496","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"],"published_time":"2024-03-26T21:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2887","summary":"Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)","cvss":7.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.7,"cvss_v4":null,"epss":0.04919,"ranking_epss":0.8963,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","https://issues.chromium.org/issues/330588502","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","https://issues.chromium.org/issues/330588502","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/","https://www.zerodayinitiative.com/blog/2024/5/2/cve-2024-2887-a-pwn2own-winning-bug-in-google-chrome"],"published_time":"2024-03-26T21:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2955","summary":"T.38 dissector crash in Wireshark 4.2.0 to 4.0.3 and 4.0.0 to 4.0.13 allows denial of service via packet injection or crafted capture file","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26322,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.com/wireshark/wireshark/-/issues/19695","https://www.wireshark.org/security/wnpa-sec-2024-06.html","https://gitlab.com/wireshark/wireshark/-/issues/19695","https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7TWJQKXOV4HYI5C4TWRKTN7B5YL7GTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZD2MNS6EW2K2SSMN4YBGPZCC47KBDNEE/","https://www.wireshark.org/security/wnpa-sec-2024-06.html"],"published_time":"2024-03-26T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-29131","summary":"Out-of-bounds Write vulnerability in Apache Commons Configuration.This issue affects Apache Commons Configuration: from 2.0 before 2.10.1.\n\nUsers are recommended to upgrade to version 2.10.1, which fixes the issue.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00248,"ranking_epss":0.48144,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/03/20/4","https://lists.apache.org/thread/03nzzzjn4oknyw5y0871tw7ltj0t3r37","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNKDKEEKZNL5FGCTZKJ6CFXFVWFL5FJ7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YD4AFTIIQW662LUAQRMWS6BBKYSZG3YS/","http://www.openwall.com/lists/oss-security/2024/03/20/4","https://lists.apache.org/thread/03nzzzjn4oknyw5y0871tw7ltj0t3r37","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNKDKEEKZNL5FGCTZKJ6CFXFVWFL5FJ7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YD4AFTIIQW662LUAQRMWS6BBKYSZG3YS/","https://security.netapp.com/advisory/ntap-20241213-0001/"],"published_time":"2024-03-21T09:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-29133","summary":"Out-of-bounds Write vulnerability in Apache Commons Configuration.This issue affects Apache Commons Configuration: from 2.0 before 2.10.1.\n\nUsers are recommended to upgrade to version 2.10.1, which fixes the issue.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00997,"ranking_epss":0.76992,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/03/20/3","https://lists.apache.org/thread/ccb9w15bscznh6tnp3wsvrrj9crbszh2","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNKDKEEKZNL5FGCTZKJ6CFXFVWFL5FJ7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YD4AFTIIQW662LUAQRMWS6BBKYSZG3YS/","http://www.openwall.com/lists/oss-security/2024/03/20/3","https://lists.apache.org/thread/ccb9w15bscznh6tnp3wsvrrj9crbszh2","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNKDKEEKZNL5FGCTZKJ6CFXFVWFL5FJ7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YD4AFTIIQW662LUAQRMWS6BBKYSZG3YS/"],"published_time":"2024-03-21T09:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2625","summary":"Object lifecycle issue in V8 in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00945,"ranking_epss":0.76358,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/327740539","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/327740539","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/"],"published_time":"2024-03-20T17:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2626","summary":"Out of bounds read in Swiftshader in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00126,"ranking_epss":0.31912,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/40945098","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/40945098","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/"],"published_time":"2024-03-20T17:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2627","summary":"Use after free in Canvas in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00728,"ranking_epss":0.72669,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/41493290","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/41493290","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/"],"published_time":"2024-03-20T17:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2628","summary":"Inappropriate implementation in Downloads in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted URL. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0018,"ranking_epss":0.39626,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/41487774","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/41487774","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/"],"published_time":"2024-03-20T17:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2629","summary":"Incorrect security UI in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/41487721","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/41487721","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/"],"published_time":"2024-03-20T17:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2630","summary":"Inappropriate implementation in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00123,"ranking_epss":0.31409,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/41481877","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/41481877","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/"],"published_time":"2024-03-20T17:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2631","summary":"Inappropriate implementation in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00166,"ranking_epss":0.3767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/41495878","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/41495878","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/"],"published_time":"2024-03-20T17:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-50967","summary":"latchset jose through version 11 allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01386,"ranking_epss":0.80352,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/P3ngu1nW/CVE_Request/blob/main/latch-jose.md","https://github.com/latchset/jose","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CIFPQUCLNWEAHYYJWCQD3AZPWYIV6YT3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OOBFVMOAV732C7PY74AHJ62ZNKT3ISZ6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7EGLOAFN2PWZ75ZRLTUDUZCIPH2VFZU/","https://github.com/P3ngu1nW/CVE_Request/blob/main/latch-jose.md","https://github.com/latchset/jose","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CIFPQUCLNWEAHYYJWCQD3AZPWYIV6YT3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OOBFVMOAV732C7PY74AHJ62ZNKT3ISZ6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7EGLOAFN2PWZ75ZRLTUDUZCIPH2VFZU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIFPQUCLNWEAHYYJWCQD3AZPWYIV6YT3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OOBFVMOAV732C7PY74AHJ62ZNKT3ISZ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W7EGLOAFN2PWZ75ZRLTUDUZCIPH2VFZU/"],"published_time":"2024-03-20T16:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-46839","summary":"PCI devices can make use of a functionality called phantom functions,\nthat when enabled allows the device to generate requests using the IDs\nof functions that are otherwise unpopulated.  This allows a device to\nextend the number of outstanding requests.\n\nSuch phantom functions need an IOMMU context setup, but failure to\nsetup the context is not fatal when the device is assigned.  Not\nfailing device assignment when such failure happens can lead to the\nprimary device being assigned to a guest, while some of the phantom\nfunctions are assigned to a different domain.\n","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00256,"ranking_epss":0.49001,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://xenbits.xenproject.org/xsa/advisory-449.html","http://xenbits.xen.org/xsa/advisory-449.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/","https://xenbits.xenproject.org/xsa/advisory-449.html"],"published_time":"2024-03-20T11:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-46840","summary":"Incorrect placement of a preprocessor directive in source code results\nin logic that doesn't operate as intended when support for HVM guests is\ncompiled out of Xen.\n","cvss":4.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.1,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22272,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://xenbits.xenproject.org/xsa/advisory-450.html","http://xenbits.xen.org/xsa/advisory-450.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/","https://xenbits.xenproject.org/xsa/advisory-450.html"],"published_time":"2024-03-20T11:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-46841","summary":"Recent x86 CPUs offer functionality named Control-flow Enforcement\nTechnology (CET).  A sub-feature of this are Shadow Stacks (CET-SS).\nCET-SS is a hardware feature designed to protect against Return Oriented\nProgramming attacks. When enabled, traditional stacks holding both data\nand return addresses are accompanied by so called \"shadow stacks\",\nholding little more than return addresses.  Shadow stacks aren't\nwritable by normal instructions, and upon function returns their\ncontents are used to check for possible manipulation of a return address\ncoming from the traditional stack.\n\nIn particular certain memory accesses need intercepting by Xen.  In\nvarious cases the necessary emulation involves kind of replaying of\nthe instruction.  Such replaying typically involves filling and then\ninvoking of a stub.  Such a replayed instruction may raise an\nexceptions, which is expected and dealt with accordingly.\n\nUnfortunately the interaction of both of the above wasn't right:\nRecovery involves removal of a call frame from the (traditional) stack.\nThe counterpart of this operation for the shadow stack was missing.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00065,"ranking_epss":0.20045,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/","https://xenbits.xenproject.org/xsa/advisory-451.html","http://xenbits.xen.org/xsa/advisory-451.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HES2IJXZY3H7HBPP4NVSVYYNGW254DMI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/","https://xenbits.xenproject.org/xsa/advisory-451.html"],"published_time":"2024-03-20T11:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2002","summary":"A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00139,"ranking_epss":0.34089,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2024-2002","https://bugzilla.redhat.com/show_bug.cgi?id=2267700","https://github.com/davea42/libdwarf-code/blob/main/bugxml/data.txt","https://access.redhat.com/security/cve/CVE-2024-2002","https://bugzilla.redhat.com/show_bug.cgi?id=2267700","https://github.com/davea42/libdwarf-code/blob/main/bugxml/data.txt","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGPVLSPIXR32J6FOAFTTIMYTUUXJICGW/"],"published_time":"2024-03-18T13:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23672","summary":"Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.\n\nOlder, EOL versions may also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.01061,"ranking_epss":0.77679,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f","http://www.openwall.com/lists/oss-security/2024/03/13/4","https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f","https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/736G4GPZWS2DSQO5WKXO3G6OMZKFEK55/","https://security.netapp.com/advisory/ntap-20240402-0002/"],"published_time":"2024-03-13T16:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-24549","summary":"Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Other, older, EOL versions may also be affected.\n\nUsers are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.6439,"ranking_epss":0.98453,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg","http://www.openwall.com/lists/oss-security/2024/03/13/3","https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg","https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/736G4GPZWS2DSQO5WKXO3G6OMZKFEK55/","https://security.netapp.com/advisory/ntap-20240402-0002/"],"published_time":"2024-03-13T16:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2400","summary":"Use after free in Performance Manager in Google Chrome prior to 122.0.6261.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00147,"ranking_epss":0.35147,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_12.html","https://issues.chromium.org/issues/327696052","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T55OZ7JOMLNT5ICM4DTCZOJZD6TZICKO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VIKPDCUMQNF2DFB7TU3V4ISJ7WFJH7YI/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_12.html","https://issues.chromium.org/issues/327696052","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T55OZ7JOMLNT5ICM4DTCZOJZD6TZICKO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VIKPDCUMQNF2DFB7TU3V4ISJ7WFJH7YI/"],"published_time":"2024-03-13T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43279","summary":"Null Pointer Dereference in mask_cidr6 component at cidr.c in Tcpreplay 4.4.4 allows attackers to crash the application via crafted tcprewrite command.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02869,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/appneta/tcpreplay/issues/824","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHUILQV2YJI5TXXXJA5FQ2HJQGFT7NTN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMW5CIODKRHUUH7NTAYIRWGSJ56DTGXM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3GYCHPVJ2VFN3D7FI4IRMDVMILLWBRF/","https://github.com/appneta/tcpreplay/issues/824","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHUILQV2YJI5TXXXJA5FQ2HJQGFT7NTN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMW5CIODKRHUUH7NTAYIRWGSJ56DTGXM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3GYCHPVJ2VFN3D7FI4IRMDVMILLWBRF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMW5CIODKRHUUH7NTAYIRWGSJ56DTGXM/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3GYCHPVJ2VFN3D7FI4IRMDVMILLWBRF/"],"published_time":"2024-03-12T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-28757","summary":"libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01195,"ranking_epss":0.78903,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/03/15/1","https://github.com/libexpat/libexpat/issues/839","https://github.com/libexpat/libexpat/pull/842","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/","https://security.netapp.com/advisory/ntap-20240322-0001/","http://www.openwall.com/lists/oss-security/2024/03/15/1","https://github.com/libexpat/libexpat/issues/839","https://github.com/libexpat/libexpat/pull/842","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/","https://security.netapp.com/advisory/ntap-20240322-0001/"],"published_time":"2024-03-10T05:15:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-28176","summary":"jose is JavaScript module for JSON Object Signing and Encryption, providing support for JSON Web Tokens (JWT), JSON Web Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), JSON Web Key Set (JWKS), and more. A vulnerability has \n been identified in the JSON Web Encryption (JWE) decryption interfaces, specifically related to the support for decompressing plaintext after its decryption. Under certain conditions it is possible to have the user's environment consume unreasonable amount of CPU time or memory during JWE Decryption operations. This issue has been patched in versions 2.0.7 and 4.15.5.","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00572,"ranking_epss":0.68702,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/panva/jose/commit/02a65794f7873cdaf12e81e80ad076fcdc4a9314","https://github.com/panva/jose/commit/1b91d88d2f8233f3477a5f4579aa5f8057b2ee8b","https://github.com/panva/jose/security/advisories/GHSA-hhhv-q57g-882q","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/","https://github.com/panva/jose/commit/02a65794f7873cdaf12e81e80ad076fcdc4a9314","https://github.com/panva/jose/commit/1b91d88d2f8233f3477a5f4579aa5f8057b2ee8b","https://github.com/panva/jose/security/advisories/GHSA-hhhv-q57g-882q","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/"],"published_time":"2024-03-09T01:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-28180","summary":"Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.04859,"ranking_epss":0.89563,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298","https://github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a","https://github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502","https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IJ6LAJJ2FTA2JVVOACCV5RZTOIZLXUNJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNPMXL36YGS3GQEVI3Q5HKHJ7YAAQXL5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MSOMHDKRPU3A2JEMRODT2IREDFBLVPGS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/","https://github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298","https://github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a","https://github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502","https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IJ6LAJJ2FTA2JVVOACCV5RZTOIZLXUNJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNPMXL36YGS3GQEVI3Q5HKHJ7YAAQXL5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MSOMHDKRPU3A2JEMRODT2IREDFBLVPGS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/"],"published_time":"2024-03-09T01:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-28184","summary":"WeasyPrint helps web developers to create PDF documents. Since version 61.0, there's a vulnerability which allows attaching content of arbitrary files and URLs to a generated PDF document, even if `url_fetcher` is configured to prevent access to files and URLs. This vulnerability has been patched in version 61.2.","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00123,"ranking_epss":0.31387,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Kozea/WeasyPrint/commit/734ee8e2dc84ff3090682f3abff056d0907c8598","https://github.com/Kozea/WeasyPrint/security/advisories/GHSA-35jj-wx47-4w8r","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLQZMOEDY72TS43HDXOBVID2VYCTWIH6/","https://github.com/Kozea/WeasyPrint/commit/734ee8e2dc84ff3090682f3abff056d0907c8598","https://github.com/Kozea/WeasyPrint/security/advisories/GHSA-35jj-wx47-4w8r","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLQZMOEDY72TS43HDXOBVID2VYCTWIH6/"],"published_time":"2024-03-09T01:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23280","summary":"An injection issue was addressed with improved validation. This issue is fixed in Safari 17.4, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, watchOS 10.4. A maliciously crafted webpage may be able to fingerprint the user.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00515,"ranking_epss":0.66656,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.apple.com/en-us/120881","https://support.apple.com/en-us/120882","https://support.apple.com/en-us/120893","https://support.apple.com/en-us/120894","https://support.apple.com/en-us/120895","http://seclists.org/fulldisclosure/2024/Mar/20","http://seclists.org/fulldisclosure/2024/Mar/21","http://seclists.org/fulldisclosure/2024/Mar/24","http://seclists.org/fulldisclosure/2024/Mar/25","http://www.openwall.com/lists/oss-security/2024/03/26/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/","https://support.apple.com/en-us/HT214081","https://support.apple.com/en-us/HT214084","https://support.apple.com/en-us/HT214086","https://support.apple.com/en-us/HT214088","https://support.apple.com/en-us/HT214089","https://support.apple.com/kb/HT214081","https://support.apple.com/kb/HT214084","https://support.apple.com/kb/HT214086","https://support.apple.com/kb/HT214089"],"published_time":"2024-03-08T02:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23284","summary":"A logic issue was addressed with improved state management. This issue is fixed in Safari 17.4, iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, visionOS 1.1, watchOS 10.4. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00884,"ranking_epss":0.75466,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.apple.com/en-us/120880","https://support.apple.com/en-us/120881","https://support.apple.com/en-us/120882","https://support.apple.com/en-us/120883","https://support.apple.com/en-us/120893","https://support.apple.com/en-us/120894","https://support.apple.com/en-us/120895","http://seclists.org/fulldisclosure/2024/Mar/20","http://seclists.org/fulldisclosure/2024/Mar/21","http://seclists.org/fulldisclosure/2024/Mar/24","http://seclists.org/fulldisclosure/2024/Mar/25","http://seclists.org/fulldisclosure/2024/Mar/26","http://www.openwall.com/lists/oss-security/2024/03/26/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/","https://support.apple.com/en-us/HT214081","https://support.apple.com/en-us/HT214082","https://support.apple.com/en-us/HT214084","https://support.apple.com/en-us/HT214086","https://support.apple.com/en-us/HT214087","https://support.apple.com/en-us/HT214088","https://support.apple.com/en-us/HT214089","https://support.apple.com/kb/HT214081","https://support.apple.com/kb/HT214082","https://support.apple.com/kb/HT214084","https://support.apple.com/kb/HT214087","https://support.apple.com/kb/HT214089"],"published_time":"2024-03-08T02:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23254","summary":"The issue was addressed with improved UI handling. This issue is fixed in Safari 17.4, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, visionOS 1.1, watchOS 10.4. A malicious website may exfiltrate audio data cross-origin.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00468,"ranking_epss":0.64512,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.apple.com/en-us/120881","https://support.apple.com/en-us/120882","https://support.apple.com/en-us/120883","https://support.apple.com/en-us/120893","https://support.apple.com/en-us/120894","https://support.apple.com/en-us/120895","http://seclists.org/fulldisclosure/2024/Mar/20","http://seclists.org/fulldisclosure/2024/Mar/21","http://seclists.org/fulldisclosure/2024/Mar/24","http://seclists.org/fulldisclosure/2024/Mar/25","http://seclists.org/fulldisclosure/2024/Mar/26","http://www.openwall.com/lists/oss-security/2024/03/26/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","https://support.apple.com/en-us/HT214081","https://support.apple.com/en-us/HT214084","https://support.apple.com/en-us/HT214086","https://support.apple.com/en-us/HT214087","https://support.apple.com/en-us/HT214088","https://support.apple.com/en-us/HT214089","https://support.apple.com/kb/HT214081","https://support.apple.com/kb/HT214084","https://support.apple.com/kb/HT214087","https://support.apple.com/kb/HT214089"],"published_time":"2024-03-08T02:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23263","summary":"A logic issue was addressed with improved validation. This issue is fixed in Safari 17.4, iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, visionOS 1.1, watchOS 10.4. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0062,"ranking_epss":0.70083,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.apple.com/en-us/120880","https://support.apple.com/en-us/120881","https://support.apple.com/en-us/120882","https://support.apple.com/en-us/120883","https://support.apple.com/en-us/120893","https://support.apple.com/en-us/120894","https://support.apple.com/en-us/120895","http://seclists.org/fulldisclosure/2024/Mar/20","http://seclists.org/fulldisclosure/2024/Mar/21","http://seclists.org/fulldisclosure/2024/Mar/24","http://seclists.org/fulldisclosure/2024/Mar/25","http://seclists.org/fulldisclosure/2024/Mar/26","http://www.openwall.com/lists/oss-security/2024/03/26/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/","https://support.apple.com/en-us/HT214081","https://support.apple.com/en-us/HT214082","https://support.apple.com/en-us/HT214084","https://support.apple.com/en-us/HT214086","https://support.apple.com/en-us/HT214087","https://support.apple.com/en-us/HT214088","https://support.apple.com/en-us/HT214089","https://support.apple.com/kb/HT214081","https://support.apple.com/kb/HT214082","https://support.apple.com/kb/HT214084","https://support.apple.com/kb/HT214087","https://support.apple.com/kb/HT214089"],"published_time":"2024-03-08T02:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2044","summary":"pgAdmin <= 8.3 is affected by a path-traversal vulnerability while deserializing users’ sessions in the session handling code. If the server is running on Windows, an unauthenticated attacker can load and deserialize remote pickle objects and gain code execution. If the server is running on POSIX/Linux, an authenticated attacker can upload pickle objects, deserialize them, and gain code execution.","cvss":9.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.9,"cvss_v4":null,"epss":0.83473,"ranking_epss":0.99282,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pgadmin-org/pgadmin4/issues/7258","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LUYN2JXKKHFSVTASH344TBRGWDH64XQV/","https://www.shielder.com/advisories/pgadmin-path-traversal_leads_to_unsafe_deserialization_and_rce/","https://github.com/pgadmin-org/pgadmin4/issues/7258","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LUYN2JXKKHFSVTASH344TBRGWDH64XQV/","https://www.shielder.com/advisories/pgadmin-path-traversal_leads_to_unsafe_deserialization_and_rce/"],"published_time":"2024-03-07T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1931","summary":"NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop. Unbound 1.18.0 introduced a feature that removes EDE records from responses with size higher than the client's advertised buffer size. Before removing all the EDE records however, it would try to see if trimming the extra text fields on those records would result in an acceptable size while still retaining the EDE codes. Due to an unchecked condition, the code that trims the text of the EDE records could loop indefinitely. This happens when Unbound would reply with attached EDE information on a positive reply and the client's buffer size is smaller than the needed space to include EDE records. The vulnerability can only be triggered when the 'ede: yes' option is used; non default configuration. From version 1.19.2 on, the code is fixed to avoid looping indefinitely.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06753,"ranking_epss":0.91315,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCBRQ7KMSIGBQ6A4SBL5PF326DIJIIV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B2JUIFPA7H75Q2W3VXW2TUNHK6NVGOX4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/","https://lists.freebsd.org/archives/freebsd-security/2024-July/000283.html","https://security.netapp.com/advisory/ntap-20240705-0006/","https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCBRQ7KMSIGBQ6A4SBL5PF326DIJIIV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B2JUIFPA7H75Q2W3VXW2TUNHK6NVGOX4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/","https://lists.freebsd.org/archives/freebsd-security/2024-July/000283.html","https://security.netapp.com/advisory/ntap-20240705-0006/","https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt"],"published_time":"2024-03-07T10:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2174","summary":"Inappropriate implementation in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0013,"ranking_epss":0.32433,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/325866363","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/325866363","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/"],"published_time":"2024-03-06T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2176","summary":"Use after free in FedCM in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00957,"ranking_epss":0.76488,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/325936438","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/325936438","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/"],"published_time":"2024-03-06T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-2173","summary":"Out of bounds memory access in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00142,"ranking_epss":0.34452,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/325893559","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/","https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/325893559","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/"],"published_time":"2024-03-06T19:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25111","summary":"Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.04827,"ranking_epss":0.89528,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.squid-cache.org/Versions/v6/SQUID-2024_1.patch","https://github.com/squid-cache/squid/security/advisories/GHSA-72c2-c3wm-8qxc","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7R4KPSO3MQT3KAOZV7LC2GG3CYMCGK7H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWQHRDRHDM5PQTU6BHH4C5KGL37X6TVI/","https://security.netapp.com/advisory/ntap-20240605-0001/","http://www.squid-cache.org/Versions/v6/SQUID-2024_1.patch","https://github.com/squid-cache/squid/security/advisories/GHSA-72c2-c3wm-8qxc","https://lists.debian.org/debian-lts-announce/2025/03/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7R4KPSO3MQT3KAOZV7LC2GG3CYMCGK7H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWQHRDRHDM5PQTU6BHH4C5KGL37X6TVI/","https://security.netapp.com/advisory/ntap-20240605-0001/"],"published_time":"2024-03-06T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-28084","summary":"p2putil.c in iNet wireless daemon (IWD) through 2.15 allows attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact because of initialization issues in situations where parsing of advertised service information fails.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00151,"ranking_epss":0.35706,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=52a47c9fd428904de611a90cbf8b223af879684d","https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=d34b4e16e045142590ed7cb653e01ed0ae5362eb","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KSGT4IZ23CJBOQA3AFYEMBJ5OHFZBMK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYRPQ3OLV3GGLUCDYWBHU34DLBLM62XJ/","https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=52a47c9fd428904de611a90cbf8b223af879684d","https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=d34b4e16e045142590ed7cb653e01ed0ae5362eb","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KSGT4IZ23CJBOQA3AFYEMBJ5OHFZBMK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYRPQ3OLV3GGLUCDYWBHU34DLBLM62XJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KSGT4IZ23CJBOQA3AFYEMBJ5OHFZBMK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYRPQ3OLV3GGLUCDYWBHU34DLBLM62XJ/"],"published_time":"2024-03-03T21:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-24246","summary":"Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00088,"ranking_epss":0.2511,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/qpdf/qpdf/issues/1123","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB/","https://github.com/qpdf/qpdf/issues/1123","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB/"],"published_time":"2024-02-29T20:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-22871","summary":"An issue in Clojure versions 1.20 to 1.12.0-alpha5 allows an attacker to cause a denial of service (DoS) via the clojure.core$partial$fn__5920 function.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01049,"ranking_epss":0.7757,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackmd.io/%40fe1w0/rymmJGida","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25FKUOYXQZGGJMFUM5HJABWMIX2TILRV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWWK2SO2MH4SXPO6L444MM6LHVLVFULV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YFPGUDXMW6OXKIDGCOZFEAXO74VQIB2T/","https://hackmd.io/%40fe1w0/rymmJGida","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25FKUOYXQZGGJMFUM5HJABWMIX2TILRV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWWK2SO2MH4SXPO6L444MM6LHVLVFULV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YFPGUDXMW6OXKIDGCOZFEAXO74VQIB2T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25FKUOYXQZGGJMFUM5HJABWMIX2TILRV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWWK2SO2MH4SXPO6L444MM6LHVLVFULV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFPGUDXMW6OXKIDGCOZFEAXO74VQIB2T/"],"published_time":"2024-02-29T02:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25713","summary":"yyjson through 0.8.0 has a double free, leading to remote code execution in some cases, because the pool_free function lacks loop checks. (pool_free is part of the pool series allocator, along with pool_malloc and pool_realloc.)","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.05769,"ranking_epss":0.90491,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/ibireme/yyjson/security/advisories/GHSA-q4m7-9pcm-fpxh","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6KQ67T4R7QEWURW5NMCCVLTBASL4ECHE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NNICQVIF7BRYFWYRL3HPVAJIPXN4OVTX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TKQPEREDUDKGYJMFNFDQVYCVLWDRO2Y2/","https://github.com/ibireme/yyjson/security/advisories/GHSA-q4m7-9pcm-fpxh","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6KQ67T4R7QEWURW5NMCCVLTBASL4ECHE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NNICQVIF7BRYFWYRL3HPVAJIPXN4OVTX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TKQPEREDUDKGYJMFNFDQVYCVLWDRO2Y2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KQ67T4R7QEWURW5NMCCVLTBASL4ECHE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NNICQVIF7BRYFWYRL3HPVAJIPXN4OVTX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TKQPEREDUDKGYJMFNFDQVYCVLWDRO2Y2/"],"published_time":"2024-02-29T01:44:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1938","summary":"Type Confusion in V8 in Google Chrome prior to 122.0.6261.94 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59883,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_27.html","https://issues.chromium.org/issues/324596281","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWSP5MIK7CDWJQHN2SJJX2YGSSS7E4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6KJCEJWJR5Z54Z75LRJGELDNMFDKLZG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTGM2WHYSZAUUPENB7YO6E5ONAKE6AKJ/","https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_27.html","https://issues.chromium.org/issues/324596281","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWSP5MIK7CDWJQHN2SJJX2YGSSS7E4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6KJCEJWJR5Z54Z75LRJGELDNMFDKLZG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTGM2WHYSZAUUPENB7YO6E5ONAKE6AKJ/"],"published_time":"2024-02-29T01:43:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1939","summary":"Type Confusion in V8 in Google Chrome prior to 122.0.6261.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.45835,"ranking_epss":0.97634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_27.html","https://issues.chromium.org/issues/323694592","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWSP5MIK7CDWJQHN2SJJX2YGSSS7E4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6KJCEJWJR5Z54Z75LRJGELDNMFDKLZG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTGM2WHYSZAUUPENB7YO6E5ONAKE6AKJ/","https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_27.html","https://issues.chromium.org/issues/323694592","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWSP5MIK7CDWJQHN2SJJX2YGSSS7E4O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6KJCEJWJR5Z54Z75LRJGELDNMFDKLZG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTGM2WHYSZAUUPENB7YO6E5ONAKE6AKJ/"],"published_time":"2024-02-29T01:43:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27285","summary":"YARD is a Ruby Documentation tool. The \"frames.html\" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the \"frames.erb\" template file.  This vulnerability is fixed in 0.9.36.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.03316,"ranking_epss":0.87282,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/lsegal/yard/commit/1fcb2d8b316caf8779cfdcf910715e9ab583f0aa","https://github.com/lsegal/yard/commit/2069e2bf08293bda2fcc78f7d0698af6354054be","https://github.com/lsegal/yard/pull/1538","https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc","https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml","https://lists.debian.org/debian-lts-announce/2024/03/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MR3Z2E2UIZZ7YOR7R645EVSBGWMB2RGA/","https://github.com/lsegal/yard/commit/1fcb2d8b316caf8779cfdcf910715e9ab583f0aa","https://github.com/lsegal/yard/commit/2069e2bf08293bda2fcc78f7d0698af6354054be","https://github.com/lsegal/yard/pull/1538","https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc","https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml","https://lists.debian.org/debian-lts-announce/2024/03/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MR3Z2E2UIZZ7YOR7R645EVSBGWMB2RGA/"],"published_time":"2024-02-28T20:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27507","summary":"libLAS 1.8.1 contains a memory leak vulnerability in /libLAS/apps/ts2las.cpp.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31801,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/LuMingYinDetect/libLAS_defects/blob/main/libLAS_detect_1.md","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QRV2D4GYUZNZRJHVGFSYSOSZLCETI4E/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2B6GZQ3WUVFNAAWFQJAQY7UM4OH5TA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVOY7E2QWQRVXZTJGI7Z4KXGSU6BGEKH/","https://github.com/LuMingYinDetect/libLAS_defects/blob/main/libLAS_detect_1.md","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QRV2D4GYUZNZRJHVGFSYSOSZLCETI4E/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2B6GZQ3WUVFNAAWFQJAQY7UM4OH5TA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVOY7E2QWQRVXZTJGI7Z4KXGSU6BGEKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2B6GZQ3WUVFNAAWFQJAQY7UM4OH5TA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WVOY7E2QWQRVXZTJGI7Z4KXGSU6BGEKH/"],"published_time":"2024-02-27T15:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25711","summary":"diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. Contents of any file, such as ../.ssh/id_rsa, may be disclosed to an attacker. This occurs because the value of the gpg --use-embedded-filenames option is trusted.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05259,"ranking_epss":0.90004,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OUNBANAWD6TZH2NRRV4YUIAXEHLUJQ47/","https://salsa.debian.org/reproducible-builds/diffoscope/-/commit/dfed769904c27d66a14a5903823d9c8c5aae860e","https://salsa.debian.org/reproducible-builds/diffoscope/-/issues/361","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OUNBANAWD6TZH2NRRV4YUIAXEHLUJQ47/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OUNBANAWD6TZH2NRRV4YUIAXEHLUJQ47/","https://salsa.debian.org/reproducible-builds/diffoscope/-/commit/dfed769904c27d66a14a5903823d9c8c5aae860e","https://salsa.debian.org/reproducible-builds/diffoscope/-/issues/361"],"published_time":"2024-02-27T02:15:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23839","summary":"Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine.  Prior to 7.0.3, specially crafted traffic can cause a heap use after free if the ruleset uses the http.request_header or http.response_header keyword.  The vulnerability has been patched in 7.0.3.  To work around the vulnerability, avoid the http.request_header and http.response_header keywords.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00213,"ranking_epss":0.43833,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/OISF/suricata/commit/cd731fcaf42e5f7078c9be643bfa0cee2ad53e8f","https://github.com/OISF/suricata/security/advisories/GHSA-qxj6-hr2p-mmc7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/","https://redmine.openinfosecfoundation.org/issues/6657","https://github.com/OISF/suricata/commit/cd731fcaf42e5f7078c9be643bfa0cee2ad53e8f","https://github.com/OISF/suricata/security/advisories/GHSA-qxj6-hr2p-mmc7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/","https://redmine.openinfosecfoundation.org/issues/6657"],"published_time":"2024-02-26T16:27:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-24568","summary":"Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine.  Prior to 7.0.3, the rules inspecting HTTP2 headers can get bypassed by crafted traffic. The vulnerability has been patched in 7.0.3.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27795,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/OISF/suricata/commit/478a2a38f54e2ae235f8486bff87d7d66b6307f0","https://github.com/OISF/suricata/security/advisories/GHSA-gv29-5hqw-5h8c","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/","https://redmine.openinfosecfoundation.org/issues/6717","https://github.com/OISF/suricata/commit/478a2a38f54e2ae235f8486bff87d7d66b6307f0","https://github.com/OISF/suricata/security/advisories/GHSA-gv29-5hqw-5h8c","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/","https://redmine.openinfosecfoundation.org/issues/6717"],"published_time":"2024-02-26T16:27:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25081","summary":"Splinefont in FontForge through 20230101 allows command injection via crafted filenames.","cvss":4.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11814,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/03/08/2","https://fontforge.org/en-US/downloads/","https://github.com/fontforge/fontforge/pull/5367","https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCH22HIO2C6M4BZWF5EYIWVFBXL5BQAH/","http://www.openwall.com/lists/oss-security/2024/03/08/2","https://fontforge.org/en-US/downloads/","https://github.com/fontforge/fontforge/pull/5367","https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCH22HIO2C6M4BZWF5EYIWVFBXL5BQAH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCH22HIO2C6M4BZWF5EYIWVFBXL5BQAH/"],"published_time":"2024-02-26T16:27:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25082","summary":"Splinefont in FontForge through 20230101 allows command injection via crafted archives or compressed files.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00913,"ranking_epss":0.75913,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/03/08/2","https://fontforge.org/en-US/downloads/","https://github.com/fontforge/fontforge/pull/5367","https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCH22HIO2C6M4BZWF5EYIWVFBXL5BQAH/","http://www.openwall.com/lists/oss-security/2024/03/08/2","https://fontforge.org/en-US/downloads/","https://github.com/fontforge/fontforge/pull/5367","https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCH22HIO2C6M4BZWF5EYIWVFBXL5BQAH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCH22HIO2C6M4BZWF5EYIWVFBXL5BQAH/"],"published_time":"2024-02-26T16:27:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23835","summary":"Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine.  Prior to version 7.0.3, excessive memory use during pgsql parsing could lead to OOM-related crashes.  This vulnerability is patched in 7.0.3.  As workaround, users can disable the pgsql app layer parser.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00256,"ranking_epss":0.49028,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/OISF/suricata/commit/86de7cffa7e8f06fe9d600127e7dabe89c7e81dd","https://github.com/OISF/suricata/commit/f52c033e566beafb4480c139eb18662a2870464f","https://github.com/OISF/suricata/security/advisories/GHSA-8583-353f-mvwc","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/","https://redmine.openinfosecfoundation.org/issues/6411","https://github.com/OISF/suricata/commit/86de7cffa7e8f06fe9d600127e7dabe89c7e81dd","https://github.com/OISF/suricata/commit/f52c033e566beafb4480c139eb18662a2870464f","https://github.com/OISF/suricata/security/advisories/GHSA-8583-353f-mvwc","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/","https://redmine.openinfosecfoundation.org/issues/6411"],"published_time":"2024-02-26T16:27:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23836","summary":"Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to versions 6.0.16 and 7.0.3, an attacker can craft traffic to cause Suricata to use far more CPU and memory for processing the traffic than needed, which can lead to extreme slow downs and denial of service.  This vulnerability is patched in 6.0.16 or 7.0.3.  Workarounds include disabling the affected protocol app-layer parser in the yaml and reducing the `stream.reassembly.depth` value helps reduce the severity of the issue.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00847,"ranking_epss":0.74877,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/OISF/suricata/commit/18841a58da71e735ddf4e52cbfa6989755ecbeb7","https://github.com/OISF/suricata/commit/2a2120ecf10c5b5713ec2bf59469fe57f7b5b747","https://github.com/OISF/suricata/commit/83c5567ea7b0b28376f57dcfee9c6301448c7bc7","https://github.com/OISF/suricata/commit/8efaebe293e2a74c8e323fa85a6f5fadf82801bc","https://github.com/OISF/suricata/commit/97953998d2d60673ed6c30ddfb6a2d59b4230f97","https://github.com/OISF/suricata/commit/b1549e930f6426eeff43f12b672337cbcda566b8","https://github.com/OISF/suricata/commit/cd035d59e3df157b606f4fe67324ea8e437be786","https://github.com/OISF/suricata/commit/ce9b90326949c94a46611d6394e28600ee5e8bd5","https://github.com/OISF/suricata/commit/e7e28822f473320658d6125f16ac3f0524baff01","https://github.com/OISF/suricata/commit/f9de1cca6182e571f1c02387dca6e695e55608af","https://github.com/OISF/suricata/security/advisories/GHSA-q33q-45cr-3cpc","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/","https://redmine.openinfosecfoundation.org/issues/6531","https://redmine.openinfosecfoundation.org/issues/6532","https://redmine.openinfosecfoundation.org/issues/6540","https://redmine.openinfosecfoundation.org/issues/6658","https://redmine.openinfosecfoundation.org/issues/6659","https://redmine.openinfosecfoundation.org/issues/6660","https://github.com/OISF/suricata/commit/18841a58da71e735ddf4e52cbfa6989755ecbeb7","https://github.com/OISF/suricata/commit/2a2120ecf10c5b5713ec2bf59469fe57f7b5b747","https://github.com/OISF/suricata/commit/83c5567ea7b0b28376f57dcfee9c6301448c7bc7","https://github.com/OISF/suricata/commit/8efaebe293e2a74c8e323fa85a6f5fadf82801bc","https://github.com/OISF/suricata/commit/97953998d2d60673ed6c30ddfb6a2d59b4230f97","https://github.com/OISF/suricata/commit/b1549e930f6426eeff43f12b672337cbcda566b8","https://github.com/OISF/suricata/commit/cd035d59e3df157b606f4fe67324ea8e437be786","https://github.com/OISF/suricata/commit/ce9b90326949c94a46611d6394e28600ee5e8bd5","https://github.com/OISF/suricata/commit/e7e28822f473320658d6125f16ac3f0524baff01","https://github.com/OISF/suricata/commit/f9de1cca6182e571f1c02387dca6e695e55608af","https://github.com/OISF/suricata/security/advisories/GHSA-q33q-45cr-3cpc","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/","https://redmine.openinfosecfoundation.org/issues/6531","https://redmine.openinfosecfoundation.org/issues/6532","https://redmine.openinfosecfoundation.org/issues/6540","https://redmine.openinfosecfoundation.org/issues/6658","https://redmine.openinfosecfoundation.org/issues/6659","https://redmine.openinfosecfoundation.org/issues/6660"],"published_time":"2024-02-26T16:27:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23837","summary":"LibHTP is a security-aware parser for the HTTP protocol. Crafted traffic can cause excessive processing time of HTTP headers, leading to denial of service. This issue is addressed in 0.5.46.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00269,"ranking_epss":0.50415,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/OISF/libhtp/commit/20ac301d801cdf01b3f021cca08a22a87f477c4a","https://github.com/OISF/libhtp/security/advisories/GHSA-f9wf-rrjj-qx8m","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/","https://redmine.openinfosecfoundation.org/issues/6444","https://github.com/OISF/libhtp/commit/20ac301d801cdf01b3f021cca08a22a87f477c4a","https://github.com/OISF/libhtp/security/advisories/GHSA-f9wf-rrjj-qx8m","https://lists.debian.org/debian-lts-announce/2025/09/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/","https://redmine.openinfosecfoundation.org/issues/6444"],"published_time":"2024-02-26T16:27:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1622","summary":"Due to a mistake in error checking, Routinator will terminate when an incoming RTR connection is reset by the peer too quickly after opening.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00204,"ranking_epss":0.42497,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HPRUIPAI2BBDGFVLN733JLIUJWLEBLF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K52QRRYBHLP73RAS3CGOPBWYT7EZVP6O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N2N3N3SNBHSH7GN3JOLR7YUF5FCTQQ5O/","https://www.nlnetlabs.nl/downloads/routinator/CVE-2024-1622.txt","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HPRUIPAI2BBDGFVLN733JLIUJWLEBLF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K52QRRYBHLP73RAS3CGOPBWYT7EZVP6O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N2N3N3SNBHSH7GN3JOLR7YUF5FCTQQ5O/","https://www.nlnetlabs.nl/downloads/routinator/CVE-2024-1622.txt"],"published_time":"2024-02-26T16:27:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21501","summary":"Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.01807,"ranking_epss":0.82858,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf","https://github.com/apostrophecms/apostrophe/discussions/4436","https://github.com/apostrophecms/sanitize-html/commit/c5dbdf77fe8b836d3bf4554ea39edb45281ec0b4","https://github.com/apostrophecms/sanitize-html/pull/650","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EB5JPYRCTS64EA5AMV3INHDPI6I4AW7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P4I5X6V3LYUNBMZ5YOW4BV427TH3IK4S/","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557","https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334","https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf","https://github.com/apostrophecms/apostrophe/discussions/4436","https://github.com/apostrophecms/sanitize-html/commit/c5dbdf77fe8b836d3bf4554ea39edb45281ec0b4","https://github.com/apostrophecms/sanitize-html/pull/650","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EB5JPYRCTS64EA5AMV3INHDPI6I4AW7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P4I5X6V3LYUNBMZ5YOW4BV427TH3IK4S/","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557","https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334"],"published_time":"2024-02-24T05:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27318","summary":"Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00408,"ranking_epss":0.61202,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/onnx/onnx/commit/66b7fb630903fdcf3e83b6b6d56d82e904264a20","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL/","https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479","https://github.com/onnx/onnx/commit/66b7fb630903fdcf3e83b6b6d56d82e904264a20","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL/","https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479"],"published_time":"2024-02-23T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-27319","summary":"Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the ONNX_ASSERT and ONNX_ASSERTM functions have an off by one string copy.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/onnx/onnx/commit/08a399ba75a805b7813ab8936b91d0e274b08287","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL/","https://github.com/onnx/onnx/commit/08a399ba75a805b7813ab8936b91d0e274b08287","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL/"],"published_time":"2024-02-23T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25629","summary":"c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00055,"ranking_epss":0.17228,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183","https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/","https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183","https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/"],"published_time":"2024-02-23T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-52160","summary":"The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0417,"ranking_epss":0.88703,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2024/02/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N46C4DTVUWK336OYDA4LGALSC5VVPTCC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QU6IR4KV3ZXJZLK2BY7HAHGZNCP7FPNI/","https://w1.fi/cgit/hostap/commit/?id=8e6485a1bcb0baffdea9e55255a81270b768439c","https://www.top10vpn.com/research/wifi-vulnerabilities/","https://lists.debian.org/debian-lts-announce/2024/02/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N46C4DTVUWK336OYDA4LGALSC5VVPTCC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QU6IR4KV3ZXJZLK2BY7HAHGZNCP7FPNI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N46C4DTVUWK336OYDA4LGALSC5VVPTCC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QU6IR4KV3ZXJZLK2BY7HAHGZNCP7FPNI/","https://w1.fi/cgit/hostap/commit/?id=8e6485a1bcb0baffdea9e55255a81270b768439c","https://www.top10vpn.com/research/wifi-vulnerabilities/"],"published_time":"2024-02-22T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3966","summary":"A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13521,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-3966","https://bugzilla.redhat.com/show_bug.cgi?id=2178363","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFZADABUDOFI2KZIRQBYFZCIKH55RGY3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VYYUBF6OW2JG7VOFEOROHXGSJCTES3QO/","https://access.redhat.com/security/cve/CVE-2023-3966","https://bugzilla.redhat.com/show_bug.cgi?id=2178363","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFZADABUDOFI2KZIRQBYFZCIKH55RGY3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VYYUBF6OW2JG7VOFEOROHXGSJCTES3QO/"],"published_time":"2024-02-22T13:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-24476","summary":"A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02747,"ranking_epss":0.86014,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gist.github.com/1047524396/369ba0ccffe255cf8142208b6142be2b","https://github.com/wireshark/wireshark/commit/108217f4bb1afb8b25fc705c2722b3e328b1ad78","https://gitlab.com/wireshark/wireshark/-/issues/19344","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/","https://gist.github.com/1047524396/369ba0ccffe255cf8142208b6142be2b","https://github.com/wireshark/wireshark/commit/108217f4bb1afb8b25fc705c2722b3e328b1ad78","https://gitlab.com/wireshark/wireshark/-/issues/19344","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/"],"published_time":"2024-02-21T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-24479","summary":"A Buffer Overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the wsutil/to_str.c, and format_fractional_part_nsecs components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00427,"ranking_epss":0.62343,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gist.github.com/1047524396/c50ad17e9a1a18990043a7cd27814c78","https://github.com/wireshark/wireshark/commit/c3720cff158c265dec2a0c6104b1d65954ae6bfd","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/","https://gist.github.com/1047524396/c50ad17e9a1a18990043a7cd27814c78","https://github.com/wireshark/wireshark/commit/c3720cff158c265dec2a0c6104b1d65954ae6bfd","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/"],"published_time":"2024-02-21T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-42843","summary":"An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, Safari 17.1, macOS Sonoma 14.1. Visiting a malicious website may lead to address bar spoofing.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.001,"ranking_epss":0.27672,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/03/26/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","https://support.apple.com/en-us/HT213981","https://support.apple.com/en-us/HT213982","https://support.apple.com/en-us/HT213984","https://support.apple.com/en-us/HT213986","http://www.openwall.com/lists/oss-security/2024/03/26/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","https://support.apple.com/en-us/HT213981","https://support.apple.com/en-us/HT213982","https://support.apple.com/en-us/HT213984","https://support.apple.com/en-us/HT213986"],"published_time":"2024-02-21T07:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1669","summary":"Out of bounds memory access in Blink in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00344,"ranking_epss":0.57071,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/41495060","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/41495060","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"],"published_time":"2024-02-21T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1670","summary":"Use after free in Mojo in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00519,"ranking_epss":0.66849,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/41481374","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/41481374","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"],"published_time":"2024-02-21T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1672","summary":"Inappropriate implementation in Content Security Policy in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00105,"ranking_epss":0.28443,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/41485789","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/41485789","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"],"published_time":"2024-02-21T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1673","summary":"Use after free in Accessibility in Google Chrome prior to 122.0.6261.57 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00613,"ranking_epss":0.6988,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/41490491","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/41490491","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"],"published_time":"2024-02-21T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1674","summary":"Inappropriate implementation in Navigation in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10518,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/40095183","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/40095183","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"],"published_time":"2024-02-21T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1675","summary":"Insufficient policy enforcement in Download in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00145,"ranking_epss":0.3483,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/41486208","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/41486208","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"],"published_time":"2024-02-21T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1676","summary":"Inappropriate implementation in Navigation in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00325,"ranking_epss":0.55555,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/40944847","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","https://issues.chromium.org/issues/40944847","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"],"published_time":"2024-02-21T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23809","summary":"A double-free vulnerability exists in the BrainVision ASCII Header Parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .vdhr file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00325,"ranking_epss":0.55557,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://talosintelligence.com/vulnerability_reports/TALOS-2024-1919","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1919","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1919"],"published_time":"2024-02-20T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23310","summary":"A use-after-free vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00543,"ranking_epss":0.6777,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://talosintelligence.com/vulnerability_reports/TALOS-2024-1923","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1923","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1923"],"published_time":"2024-02-20T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23313","summary":"An integer underflow vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to an out-of-bounds write which in turn can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01617,"ranking_epss":0.81842,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://talosintelligence.com/vulnerability_reports/TALOS-2024-1922","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1922","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1922"],"published_time":"2024-02-20T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23606","summary":"An out-of-bounds write vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00276,"ranking_epss":0.51069,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://talosintelligence.com/vulnerability_reports/TALOS-2024-1925","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1925","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1925"],"published_time":"2024-02-20T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21795","summary":"A heap-based buffer overflow vulnerability exists in the .egi parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .egi file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01273,"ranking_epss":0.79556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://talosintelligence.com/vulnerability_reports/TALOS-2024-1920","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1920","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1920"],"published_time":"2024-02-20T16:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21812","summary":"An integer overflow vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to an out-of-bounds write which in turn can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00318,"ranking_epss":0.5491,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://talosintelligence.com/vulnerability_reports/TALOS-2024-1921","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1921","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1921"],"published_time":"2024-02-20T16:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-22097","summary":"A double-free vulnerability exists in the BrainVision Header Parsing functionality of The Biosig Project libbiosig Master Branch (ab0ee111) and 2.5.0. A specially crafted .vdhr file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00325,"ranking_epss":0.55557,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://talosintelligence.com/vulnerability_reports/TALOS-2024-1917","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1917","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1917"],"published_time":"2024-02-20T16:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23305","summary":"An out-of-bounds write vulnerability exists in the BrainVisionMarker Parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .vmrk file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00815,"ranking_epss":0.74331,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://talosintelligence.com/vulnerability_reports/TALOS-2024-1918","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/","https://talosintelligence.com/vulnerability_reports/TALOS-2024-1918","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1918"],"published_time":"2024-02-20T16:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26134","summary":"cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) (RFC 8949) serialization format. Starting in version 5.5.1 and prior to version 5.6.2, an attacker can crash a service using cbor2 to parse a CBOR binary by sending a long enough object. Version 5.6.2 contains a patch for this issue.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01083,"ranking_epss":0.77907,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/agronholm/cbor2/commit/387755eacf0be35591a478d3c67fe10618a6d542","https://github.com/agronholm/cbor2/commit/4de6991ba29bf2290d7b9d83525eda7d021873df","https://github.com/agronholm/cbor2/pull/204","https://github.com/agronholm/cbor2/releases/tag/5.6.2","https://github.com/agronholm/cbor2/security/advisories/GHSA-375g-39jq-vq7m","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BT42VXZMMMCSSHMA65KKPOZCXJEYHNR5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX524ZG2XJWFV37UQKQ4LWIH4UICSGEQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWC3VU6YV6EXKCSX5GTKWLBZIDIJNQJY/","https://github.com/agronholm/cbor2/commit/387755eacf0be35591a478d3c67fe10618a6d542","https://github.com/agronholm/cbor2/commit/4de6991ba29bf2290d7b9d83525eda7d021873df","https://github.com/agronholm/cbor2/pull/204","https://github.com/agronholm/cbor2/releases/tag/5.6.2","https://github.com/agronholm/cbor2/security/advisories/GHSA-375g-39jq-vq7m","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BT42VXZMMMCSSHMA65KKPOZCXJEYHNR5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX524ZG2XJWFV37UQKQ4LWIH4UICSGEQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWC3VU6YV6EXKCSX5GTKWLBZIDIJNQJY/"],"published_time":"2024-02-19T23:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25980","summary":"Separate Groups mode restrictions were not honored in the H5P attempts report, which would display users from other groups. By default this only provided additional access to non-editing teachers.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00167,"ranking_epss":0.37845,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-80501","https://bugzilla.redhat.com/show_bug.cgi?id=2264096","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455636","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-80501","https://bugzilla.redhat.com/show_bug.cgi?id=2264096","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455636"],"published_time":"2024-02-19T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25981","summary":"Separate Groups mode restrictions were not honored when performing a forum export, which would export forum data for all groups. By default this only provided additional access to non-editing teachers.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00271,"ranking_epss":0.50648,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-80504","https://bugzilla.redhat.com/show_bug.cgi?id=2264097","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455637","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-80504","https://bugzilla.redhat.com/show_bug.cgi?id=2264097","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455637"],"published_time":"2024-02-19T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25982","summary":"The link to update all installed language packs did not include the necessary token to prevent a CSRF risk.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0038,"ranking_epss":0.59495,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-54749","https://bugzilla.redhat.com/show_bug.cgi?id=2264098","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455638","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-54749","https://bugzilla.redhat.com/show_bug.cgi?id=2264098","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455638"],"published_time":"2024-02-19T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25983","summary":"Insufficient checks in a web service made it possible to add comments to the comments block on another user's dashboard when it was not otherwise available (e.g., on their profile page).","cvss":3.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00241,"ranking_epss":0.47403,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78300","https://bugzilla.redhat.com/show_bug.cgi?id=2264099","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455641","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78300","https://bugzilla.redhat.com/show_bug.cgi?id=2264099","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455641"],"published_time":"2024-02-19T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25978","summary":"Insufficient file size checks resulted in a denial of service risk in the file picker's unzip functionality.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00292,"ranking_epss":0.5265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74641","https://bugzilla.redhat.com/show_bug.cgi?id=2264074","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455634","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74641","https://bugzilla.redhat.com/show_bug.cgi?id=2264074","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455634"],"published_time":"2024-02-19T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25979","summary":"The URL parameters accepted by forum search were not limited to the allowed parameters.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00163,"ranking_epss":0.3723,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69774","https://bugzilla.redhat.com/show_bug.cgi?id=2264095","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455635","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69774","https://bugzilla.redhat.com/show_bug.cgi?id=2264095","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/","https://moodle.org/mod/forum/discuss.php?d=455635"],"published_time":"2024-02-19T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1597","summary":"pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.28 are affected.","cvss":10.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":10.0,"cvss_v4":null,"epss":0.00508,"ranking_epss":0.66366,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/04/02/6","https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-24rp-q3w6-vc56","https://lists.debian.org/debian-lts-announce/2024/05/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZQTSMESZD2RJ5XBPSXH3TIQVUW5DIUU/","https://security.netapp.com/advisory/ntap-20240419-0008/","https://www.enterprisedb.com/docs/jdbc_connector/latest/01_jdbc_rel_notes/","https://www.enterprisedb.com/docs/security/assessments/cve-2024-1597/","http://www.openwall.com/lists/oss-security/2024/04/02/6","https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-24rp-q3w6-vc56","https://lists.debian.org/debian-lts-announce/2024/05/msg00007.html","https://lists.debian.org/debian-lts-announce/2024/12/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZQTSMESZD2RJ5XBPSXH3TIQVUW5DIUU/","https://security.netapp.com/advisory/ntap-20240419-0008/","https://www.enterprisedb.com/docs/jdbc_connector/latest/01_jdbc_rel_notes/","https://www.enterprisedb.com/docs/security/assessments/cve-2024-1597/","https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw/"],"published_time":"2024-02-19T13:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1580","summary":"An integer overflow in dav1d AV1 decoder that can occur when decoding videos with large frame size. This can lead to memory corruption within the AV1 decoder. We recommend upgrading past version 1.4.0 of dav1d.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00584,"ranking_epss":0.69081,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2024/Mar/36","http://seclists.org/fulldisclosure/2024/Mar/37","http://seclists.org/fulldisclosure/2024/Mar/38","http://seclists.org/fulldisclosure/2024/Mar/39","http://seclists.org/fulldisclosure/2024/Mar/40","http://seclists.org/fulldisclosure/2024/Mar/41","https://code.videolan.org/videolan/dav1d/-/blob/master/NEWS","https://code.videolan.org/videolan/dav1d/-/releases/1.4.0","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EPMUNDMEBGESOJ2ZNCWYEAYOOEKNWOO/","https://support.apple.com/kb/HT214093","https://support.apple.com/kb/HT214094","https://support.apple.com/kb/HT214095","https://support.apple.com/kb/HT214096","https://support.apple.com/kb/HT214097","https://support.apple.com/kb/HT214098","http://seclists.org/fulldisclosure/2024/Mar/36","http://seclists.org/fulldisclosure/2024/Mar/37","http://seclists.org/fulldisclosure/2024/Mar/38","http://seclists.org/fulldisclosure/2024/Mar/39","http://seclists.org/fulldisclosure/2024/Mar/40","http://seclists.org/fulldisclosure/2024/Mar/41","https://code.videolan.org/videolan/dav1d/-/blob/master/NEWS","https://code.videolan.org/videolan/dav1d/-/releases/1.4.0","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EPMUNDMEBGESOJ2ZNCWYEAYOOEKNWOO/","https://support.apple.com/kb/HT214093","https://support.apple.com/kb/HT214094","https://support.apple.com/kb/HT214095","https://support.apple.com/kb/HT214096","https://support.apple.com/kb/HT214097","https://support.apple.com/kb/HT214098"],"published_time":"2024-02-19T11:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-50387","summary":"Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the \"KeyTrap\" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.51989,"ranking_epss":0.97922,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/02/16/2","http://www.openwall.com/lists/oss-security/2024/02/16/3","https://access.redhat.com/security/cve/CVE-2023-50387","https://bugzilla.suse.com/show_bug.cgi?id=1219823","https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html","https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1","https://kb.isc.org/docs/cve-2023-50387","https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387","https://news.ycombinator.com/item?id=39367411","https://news.ycombinator.com/item?id=39372384","https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/","https://security.netapp.com/advisory/ntap-20240307-0007/","https://www.athene-center.de/aktuelles/key-trap","https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf","https://www.isc.org/blogs/2024-bind-security-release/","https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/","https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/","http://www.openwall.com/lists/oss-security/2024/02/16/2","http://www.openwall.com/lists/oss-security/2024/02/16/3","https://access.redhat.com/security/cve/CVE-2023-50387","https://bugzilla.suse.com/show_bug.cgi?id=1219823","https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html","https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1","https://kb.isc.org/docs/cve-2023-50387","https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00001.html","https://lists.debian.org/debian-lts-announce/2024/11/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387","https://news.ycombinator.com/item?id=39367411","https://news.ycombinator.com/item?id=39372384","https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/","https://security.netapp.com/advisory/ntap-20240307-0007/","https://www.athene-center.de/aktuelles/key-trap","https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf","https://www.isc.org/blogs/2024-bind-security-release/","https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/","https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/"],"published_time":"2024-02-14T16:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-50868","summary":"The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the \"NSEC3\" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.11802,"ranking_epss":0.93737,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/02/16/2","http://www.openwall.com/lists/oss-security/2024/02/16/3","https://access.redhat.com/security/cve/CVE-2023-50868","https://bugzilla.suse.com/show_bug.cgi?id=1219826","https://datatracker.ietf.org/doc/html/rfc5155","https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html","https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1","https://kb.isc.org/docs/cve-2023-50868","https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html","https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/","https://security.netapp.com/advisory/ntap-20240307-0008/","https://www.isc.org/blogs/2024-bind-security-release/","http://www.openwall.com/lists/oss-security/2024/02/16/2","http://www.openwall.com/lists/oss-security/2024/02/16/3","https://access.redhat.com/security/cve/CVE-2023-50868","https://bugzilla.suse.com/show_bug.cgi?id=1219826","https://datatracker.ietf.org/doc/html/rfc5155","https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html","https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1","https://kb.isc.org/docs/cve-2023-50868","https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00001.html","https://lists.debian.org/debian-lts-announce/2024/11/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html","https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/","https://security.netapp.com/advisory/ntap-20240307-0008/","https://www.isc.org/blogs/2024-bind-security-release/"],"published_time":"2024-02-14T16:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-24814","summary":"mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00205,"ranking_epss":0.4271,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/OpenIDC/mod_auth_openidc/commit/4022c12f314bd89d127d1be008b1a80a08e1203d","https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv","https://lists.debian.org/debian-lts-announce/2024/03/msg00004.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7DKVEVREYAI4F46CQAVOTPL75WLOZOE/","https://github.com/OpenIDC/mod_auth_openidc/commit/4022c12f314bd89d127d1be008b1a80a08e1203d","https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv","https://lists.debian.org/debian-lts-announce/2024/03/msg00004.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7DKVEVREYAI4F46CQAVOTPL75WLOZOE/"],"published_time":"2024-02-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4408","summary":"The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers.\nThis issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00295,"ranking_epss":0.52847,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/02/13/1","https://kb.isc.org/docs/cve-2023-4408","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://security.netapp.com/advisory/ntap-20240426-0001/","http://www.openwall.com/lists/oss-security/2024/02/13/1","https://kb.isc.org/docs/cve-2023-4408","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://security.netapp.com/advisory/ntap-20240426-0001/"],"published_time":"2024-02-13T14:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5517","summary":"A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when:\n\n  - `nxdomain-redirect <domain>;` is configured, and\n  - the resolver receives a PTR query for an RFC 1918 address that would normally result in an authoritative NXDOMAIN response.\nThis issue affects BIND 9 versions 9.12.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00143,"ranking_epss":0.34637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/02/13/1","https://kb.isc.org/docs/cve-2023-5517","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://security.netapp.com/advisory/ntap-20240503-0006/","http://www.openwall.com/lists/oss-security/2024/02/13/1","https://kb.isc.org/docs/cve-2023-5517","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://security.netapp.com/advisory/ntap-20240503-0006/"],"published_time":"2024-02-13T14:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5679","summary":"A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion failure during recursive resolution, when both of these features are enabled.\nThis issue affects BIND 9 versions 9.16.12 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.12-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00143,"ranking_epss":0.34637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/02/13/1","https://kb.isc.org/docs/cve-2023-5679","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://security.netapp.com/advisory/ntap-20240426-0002/","http://www.openwall.com/lists/oss-security/2024/02/13/1","https://kb.isc.org/docs/cve-2023-5679","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://security.netapp.com/advisory/ntap-20240426-0002/"],"published_time":"2024-02-13T14:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1454","summary":"The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.","cvss":3.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.4,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23722,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2024-1454","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64898","https://bugzilla.redhat.com/show_bug.cgi?id=2263929","https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9","https://access.redhat.com/security/cve/CVE-2024-1454","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64898","https://bugzilla.redhat.com/show_bug.cgi?id=2263929","https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9","https://lists.debian.org/debian-lts-announce/2024/12/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OWIZ5ZLO5ECYPLSTESCF7I7PQO5X6ZSU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJI2FWLY24EOPALQ43YPQEZMEP3APPPI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UECKC7X4IM4YZQ5KRQMNBNKNOXLZC7RZ/"],"published_time":"2024-02-12T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6681","summary":"A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08202,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:3267","https://access.redhat.com/errata/RHSA-2024:9281","https://access.redhat.com/security/cve/CVE-2023-6681","https://bugzilla.redhat.com/show_bug.cgi?id=2260843","https://access.redhat.com/errata/RHSA-2024:3267","https://access.redhat.com/security/cve/CVE-2023-6681","https://bugzilla.redhat.com/show_bug.cgi?id=2260843"],"published_time":"2024-02-12T14:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1062","summary":"A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.0762,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:1074","https://access.redhat.com/errata/RHSA-2024:1372","https://access.redhat.com/errata/RHSA-2024:3047","https://access.redhat.com/errata/RHSA-2024:4209","https://access.redhat.com/errata/RHSA-2024:4633","https://access.redhat.com/errata/RHSA-2024:5690","https://access.redhat.com/errata/RHSA-2024:7458","https://access.redhat.com/errata/RHSA-2025:1632","https://access.redhat.com/security/cve/CVE-2024-1062","https://bugzilla.redhat.com/show_bug.cgi?id=2256711","https://bugzilla.redhat.com/show_bug.cgi?id=2261879","https://access.redhat.com/errata/RHSA-2024:1074","https://access.redhat.com/errata/RHSA-2024:1372","https://access.redhat.com/errata/RHSA-2024:3047","https://access.redhat.com/errata/RHSA-2024:4209","https://access.redhat.com/errata/RHSA-2024:4633","https://access.redhat.com/security/cve/CVE-2024-1062","https://bugzilla.redhat.com/show_bug.cgi?id=2256711","https://bugzilla.redhat.com/show_bug.cgi?id=2261879"],"published_time":"2024-02-12T13:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-52429","summary":"dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd504bcfec41a503b32054da5472904b404341a4","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/","https://www.spinics.net/lists/dm-devel/msg56625.html","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd504bcfec41a503b32054da5472904b404341a4","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/","https://www.spinics.net/lists/dm-devel/msg56625.html"],"published_time":"2024-02-12T03:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1151","summary":"A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0002,"ranking_epss":0.05211,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:4823","https://access.redhat.com/errata/RHSA-2024:4831","https://access.redhat.com/errata/RHSA-2024:9315","https://access.redhat.com/security/cve/CVE-2024-1151","https://bugzilla.redhat.com/show_bug.cgi?id=2262241","https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/","https://access.redhat.com/errata/RHSA-2024:4823","https://access.redhat.com/errata/RHSA-2024:4831","https://access.redhat.com/security/cve/CVE-2024-1151","https://bugzilla.redhat.com/show_bug.cgi?id=2262241","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/","https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/"],"published_time":"2024-02-11T15:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0229","summary":"An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00321,"ranking_epss":0.55161,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0320","https://access.redhat.com/errata/RHSA-2024:0557","https://access.redhat.com/errata/RHSA-2024:0558","https://access.redhat.com/errata/RHSA-2024:0597","https://access.redhat.com/errata/RHSA-2024:0607","https://access.redhat.com/errata/RHSA-2024:0614","https://access.redhat.com/errata/RHSA-2024:0617","https://access.redhat.com/errata/RHSA-2024:0621","https://access.redhat.com/errata/RHSA-2024:0626","https://access.redhat.com/errata/RHSA-2024:0629","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2170","https://access.redhat.com/errata/RHSA-2024:2995","https://access.redhat.com/errata/RHSA-2024:2996","https://access.redhat.com/errata/RHSA-2025:12751","https://access.redhat.com/security/cve/CVE-2024-0229","https://bugzilla.redhat.com/show_bug.cgi?id=2256690","https://access.redhat.com/errata/RHSA-2024:0320","https://access.redhat.com/errata/RHSA-2024:0557","https://access.redhat.com/errata/RHSA-2024:0558","https://access.redhat.com/errata/RHSA-2024:0597","https://access.redhat.com/errata/RHSA-2024:0607","https://access.redhat.com/errata/RHSA-2024:0614","https://access.redhat.com/errata/RHSA-2024:0617","https://access.redhat.com/errata/RHSA-2024:0621","https://access.redhat.com/errata/RHSA-2024:0626","https://access.redhat.com/errata/RHSA-2024:0629","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2170","https://access.redhat.com/errata/RHSA-2024:2995","https://access.redhat.com/errata/RHSA-2024:2996","https://access.redhat.com/security/cve/CVE-2024-0229","https://bugzilla.redhat.com/show_bug.cgi?id=2256690","https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/"],"published_time":"2024-02-09T07:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1312","summary":"A use-after-free flaw was found in the Linux kernel's Memory Management subsystem when a user wins two races at the same time with a fail in the mas_prev_slot function. This issue could allow a local user to crash the system.","cvss":5.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.1,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06054,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2024-1312","https://bugzilla.redhat.com/show_bug.cgi?id=2225569","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/mm/memory.c?h=v6.8-rc3&id=657b5146955eba331e01b9a6ae89ce2e716ba306","https://access.redhat.com/security/cve/CVE-2024-1312","https://bugzilla.redhat.com/show_bug.cgi?id=2225569","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/mm/memory.c?h=v6.8-rc3&id=657b5146955eba331e01b9a6ae89ce2e716ba306"],"published_time":"2024-02-08T13:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20290","summary":"A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources.\r\n\r For a description of this vulnerability, see the ClamAV blog .","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.08586,"ranking_epss":0.92426,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6MUDUPAHAAV6FPB2C2QIQCFJ4SHYBOTY/","https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-hDffu6t","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6MUDUPAHAAV6FPB2C2QIQCFJ4SHYBOTY/","https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-hDffu6t"],"published_time":"2024-02-07T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1283","summary":"Heap buffer overflow in Skia in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02686,"ranking_epss":0.85877,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/41494860","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/","https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/41494860","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/"],"published_time":"2024-02-07T00:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1284","summary":"Use after free in Mojo in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0097,"ranking_epss":0.76667,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/41494539","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/","https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/41494539","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/"],"published_time":"2024-02-07T00:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1048","summary":"A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.01073,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2456","https://access.redhat.com/errata/RHSA-2024:3184","https://access.redhat.com/security/cve/CVE-2024-1048","https://bugzilla.redhat.com/show_bug.cgi?id=2256827","https://www.openwall.com/lists/oss-security/2024/02/06/3","http://www.openwall.com/lists/oss-security/2024/02/06/3","https://access.redhat.com/errata/RHSA-2024:2456","https://access.redhat.com/errata/RHSA-2024:3184","https://access.redhat.com/security/cve/CVE-2024-1048","https://bugzilla.redhat.com/show_bug.cgi?id=2256827","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRZQCVZ3XOASVFT6XLO7F2ZXOLOHIJZQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSJAEGRR3XHMBBBKYOVMII4P34IXEYPE/","https://security.netapp.com/advisory/ntap-20240223-0007/","https://www.openwall.com/lists/oss-security/2024/02/06/3"],"published_time":"2024-02-06T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0690","summary":"An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.","cvss":5.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.0,"cvss_v4":null,"epss":0.00065,"ranking_epss":0.20147,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0733","https://access.redhat.com/errata/RHSA-2024:2246","https://access.redhat.com/errata/RHSA-2024:3043","https://access.redhat.com/security/cve/CVE-2024-0690","https://bugzilla.redhat.com/show_bug.cgi?id=2259013","https://github.com/ansible/ansible/pull/82565","https://access.redhat.com/errata/RHSA-2024:0733","https://access.redhat.com/errata/RHSA-2024:2246","https://access.redhat.com/errata/RHSA-2024:3043","https://access.redhat.com/security/cve/CVE-2024-0690","https://bugzilla.redhat.com/show_bug.cgi?id=2259013","https://github.com/ansible/ansible/pull/82565","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZQGCRDSZL7ONCULMB6ZUHOE4L44KIBP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDYSWOCPZMNRU5LWKIEBW4WGWLMTU7WQ/","https://security.netapp.com/advisory/ntap-20250117-0001/"],"published_time":"2024-02-06T12:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-22667","summary":"Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00165,"ranking_epss":0.37571,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt","https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/","https://security.netapp.com/advisory/ntap-20240223-0008/","https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt","https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47","https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/","https://security.netapp.com/advisory/ntap-20240223-0008/"],"published_time":"2024-02-05T08:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21626","summary":"runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem (\"attack 2\"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run (\"attack 1\"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes (\"attack 3a\" and \"attack 3b\"). runc 1.1.12 includes patches for this issue.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.05303,"ranking_epss":0.90042,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html","http://www.openwall.com/lists/oss-security/2024/02/01/1","http://www.openwall.com/lists/oss-security/2024/02/02/3","https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf","https://github.com/opencontainers/runc/releases/tag/v1.1.12","https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv","https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/","http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html","http://www.openwall.com/lists/oss-security/2024/02/01/1","http://www.openwall.com/lists/oss-security/2024/02/02/3","https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf","https://github.com/opencontainers/runc/releases/tag/v1.1.12","https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv","https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/","https://www.vicarius.io/vsociety/posts/leaky-vessels-part-1-cve-2024-21626"],"published_time":"2024-01-31T22:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6246","summary":"A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.","cvss":8.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.4,"cvss_v4":null,"epss":0.25481,"ranking_epss":0.96233,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html","http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html","http://seclists.org/fulldisclosure/2024/Feb/3","http://seclists.org/fulldisclosure/2024/Feb/5","https://access.redhat.com/security/cve/CVE-2023-6246","https://bugzilla.redhat.com/show_bug.cgi?id=2249053","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/","https://security.gentoo.org/glsa/202402-01","https://security.netapp.com/advisory/ntap-20240216-0007/","https://www.openwall.com/lists/oss-security/2024/01/30/6","https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt","http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html","http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html","http://seclists.org/fulldisclosure/2024/Feb/3","http://seclists.org/fulldisclosure/2024/Feb/5","https://access.redhat.com/security/cve/CVE-2023-6246","https://bugzilla.redhat.com/show_bug.cgi?id=2249053","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/","https://security.gentoo.org/glsa/202402-01","https://security.netapp.com/advisory/ntap-20240216-0007/","https://www.openwall.com/lists/oss-security/2024/01/30/6","https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt"],"published_time":"2024-01-31T14:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6779","summary":"An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.","cvss":8.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00654,"ranking_epss":0.70965,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html","http://seclists.org/fulldisclosure/2024/Feb/3","https://access.redhat.com/security/cve/CVE-2023-6779","https://bugzilla.redhat.com/show_bug.cgi?id=2254395","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/","https://security.gentoo.org/glsa/202402-01","https://security.netapp.com/advisory/ntap-20240223-0006/","https://www.openwall.com/lists/oss-security/2024/01/30/6","https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt","http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html","http://seclists.org/fulldisclosure/2024/Feb/3","https://access.redhat.com/security/cve/CVE-2023-6779","https://bugzilla.redhat.com/show_bug.cgi?id=2254395","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/","https://security.gentoo.org/glsa/202402-01","https://security.netapp.com/advisory/ntap-20240223-0006/","https://www.openwall.com/lists/oss-security/2024/01/30/6","https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt"],"published_time":"2024-01-31T14:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6780","summary":"An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00215,"ranking_epss":0.44096,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html","http://seclists.org/fulldisclosure/2024/Feb/3","https://access.redhat.com/security/cve/CVE-2023-6780","https://bugzilla.redhat.com/show_bug.cgi?id=2254396","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/","https://security.gentoo.org/glsa/202402-01","https://www.openwall.com/lists/oss-security/2024/01/30/6","https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt","http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html","http://seclists.org/fulldisclosure/2024/Feb/3","https://access.redhat.com/security/cve/CVE-2023-6780","https://bugzilla.redhat.com/show_bug.cgi?id=2254396","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/","https://security.gentoo.org/glsa/202402-01","https://security.netapp.com/advisory/ntap-20250207-0010/","https://www.openwall.com/lists/oss-security/2024/01/30/6","https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt"],"published_time":"2024-01-31T14:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1086","summary":"A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.85405,"ranking_epss":0.99369,"kev":true,"propose_action":"Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation.","ransomware_campaign":"Known","references":["http://www.openwall.com/lists/oss-security/2024/04/10/22","http://www.openwall.com/lists/oss-security/2024/04/10/23","http://www.openwall.com/lists/oss-security/2024/04/14/1","http://www.openwall.com/lists/oss-security/2024/04/15/2","http://www.openwall.com/lists/oss-security/2024/04/17/5","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660","https://github.com/Notselwyn/CVE-2024-1086","https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660","https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/","https://news.ycombinator.com/item?id=39828424","https://pwning.tech/nftables/","https://security.netapp.com/advisory/ntap-20240614-0009/","http://www.openwall.com/lists/oss-security/2024/04/10/22","http://www.openwall.com/lists/oss-security/2024/04/10/23","http://www.openwall.com/lists/oss-security/2024/04/14/1","http://www.openwall.com/lists/oss-security/2024/04/15/2","http://www.openwall.com/lists/oss-security/2024/04/17/5","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660","https://github.com/Notselwyn/CVE-2024-1086","https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660","https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/","https://news.ycombinator.com/item?id=39828424","https://pwning.tech/nftables/","https://security.netapp.com/advisory/ntap-20240614-0009/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-1086"],"published_time":"2024-01-31T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1060","summary":"Use after free in Canvas in Google Chrome prior to 121.0.6167.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00353,"ranking_epss":0.57724,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html","https://crbug.com/1511567","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html","https://crbug.com/1511567","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/"],"published_time":"2024-01-30T22:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1077","summary":"Use after free in Network in Google Chrome prior to 121.0.6167.139 allowed a remote attacker to potentially exploit heap corruption via a malicious file. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01001,"ranking_epss":0.77038,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html","https://crbug.com/1511085","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html","https://crbug.com/1511085","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/"],"published_time":"2024-01-30T22:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-1059","summary":"Use after free in Peer Connection in Google Chrome prior to 121.0.6167.139 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00698,"ranking_epss":0.71997,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html","https://crbug.com/1514777","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html","https://crbug.com/1514777","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/"],"published_time":"2024-01-30T22:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23334","summary":"aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present.  Disabling follow_symlinks and using a reverse proxy are encouraged mitigations.  Version 3.9.2 fixes this issue.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.93482,"ranking_epss":0.99824,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/aio-libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b","https://github.com/aio-libs/aiohttp/pull/8079","https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/","https://github.com/aio-libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b","https://github.com/aio-libs/aiohttp/pull/8079","https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f","https://lists.debian.org/debian-lts-announce/2025/02/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/","https://www.exploit-db.com/exploits/52474"],"published_time":"2024-01-29T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23829","summary":"aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input.  Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00515,"ranking_epss":0.66674,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/aio-libs/aiohttp/commit/33ccdfb0a12690af5bb49bda2319ec0907fa7827","https://github.com/aio-libs/aiohttp/pull/8074","https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/","https://github.com/aio-libs/aiohttp/commit/33ccdfb0a12690af5bb49bda2319ec0907fa7827","https://github.com/aio-libs/aiohttp/pull/8074","https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2","https://lists.debian.org/debian-lts-announce/2025/02/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/"],"published_time":"2024-01-29T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40546","summary":"A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances.","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06984,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:1834","https://access.redhat.com/errata/RHSA-2024:1835","https://access.redhat.com/errata/RHSA-2024:1873","https://access.redhat.com/errata/RHSA-2024:1876","https://access.redhat.com/errata/RHSA-2024:1883","https://access.redhat.com/errata/RHSA-2024:1902","https://access.redhat.com/errata/RHSA-2024:1903","https://access.redhat.com/errata/RHSA-2024:1959","https://access.redhat.com/errata/RHSA-2024:2086","https://access.redhat.com/security/cve/CVE-2023-40546","https://bugzilla.redhat.com/show_bug.cgi?id=2241796","https://access.redhat.com/errata/RHSA-2024:1834","https://access.redhat.com/errata/RHSA-2024:1835","https://access.redhat.com/errata/RHSA-2024:1873","https://access.redhat.com/errata/RHSA-2024:1876","https://access.redhat.com/errata/RHSA-2024:1883","https://access.redhat.com/errata/RHSA-2024:1902","https://access.redhat.com/errata/RHSA-2024:1903","https://access.redhat.com/errata/RHSA-2024:1959","https://access.redhat.com/errata/RHSA-2024:2086","https://access.redhat.com/security/cve/CVE-2023-40546","https://bugzilla.redhat.com/show_bug.cgi?id=2241796","https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html"],"published_time":"2024-01-29T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40549","summary":"An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06984,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:1834","https://access.redhat.com/errata/RHSA-2024:1835","https://access.redhat.com/errata/RHSA-2024:1873","https://access.redhat.com/errata/RHSA-2024:1876","https://access.redhat.com/errata/RHSA-2024:1883","https://access.redhat.com/errata/RHSA-2024:1902","https://access.redhat.com/errata/RHSA-2024:1903","https://access.redhat.com/errata/RHSA-2024:1959","https://access.redhat.com/errata/RHSA-2024:2086","https://access.redhat.com/security/cve/CVE-2023-40549","https://bugzilla.redhat.com/show_bug.cgi?id=2241797","https://access.redhat.com/errata/RHSA-2024:1834","https://access.redhat.com/errata/RHSA-2024:1835","https://access.redhat.com/errata/RHSA-2024:1873","https://access.redhat.com/errata/RHSA-2024:1876","https://access.redhat.com/errata/RHSA-2024:1883","https://access.redhat.com/errata/RHSA-2024:1902","https://access.redhat.com/errata/RHSA-2024:1903","https://access.redhat.com/errata/RHSA-2024:1959","https://access.redhat.com/errata/RHSA-2024:2086","https://access.redhat.com/security/cve/CVE-2023-40549","https://bugzilla.redhat.com/show_bug.cgi?id=2241797","https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html"],"published_time":"2024-01-29T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40550","summary":"An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system's boot phase.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00024,"ranking_epss":0.06598,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:1834","https://access.redhat.com/errata/RHSA-2024:1835","https://access.redhat.com/errata/RHSA-2024:1873","https://access.redhat.com/errata/RHSA-2024:1876","https://access.redhat.com/errata/RHSA-2024:1883","https://access.redhat.com/errata/RHSA-2024:1902","https://access.redhat.com/errata/RHSA-2024:1903","https://access.redhat.com/errata/RHSA-2024:1959","https://access.redhat.com/errata/RHSA-2024:2086","https://access.redhat.com/security/cve/CVE-2023-40550","https://bugzilla.redhat.com/show_bug.cgi?id=2259915","https://access.redhat.com/errata/RHSA-2024:1834","https://access.redhat.com/errata/RHSA-2024:1835","https://access.redhat.com/errata/RHSA-2024:1873","https://access.redhat.com/errata/RHSA-2024:1876","https://access.redhat.com/errata/RHSA-2024:1883","https://access.redhat.com/errata/RHSA-2024:1902","https://access.redhat.com/errata/RHSA-2024:1903","https://access.redhat.com/errata/RHSA-2024:1959","https://access.redhat.com/errata/RHSA-2024:2086","https://access.redhat.com/security/cve/CVE-2023-40550","https://bugzilla.redhat.com/show_bug.cgi?id=2259915","https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html"],"published_time":"2024-01-29T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40551","summary":"A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system's boot phase.","cvss":5.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.1,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.03107,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:1834","https://access.redhat.com/errata/RHSA-2024:1835","https://access.redhat.com/errata/RHSA-2024:1873","https://access.redhat.com/errata/RHSA-2024:1876","https://access.redhat.com/errata/RHSA-2024:1883","https://access.redhat.com/errata/RHSA-2024:1902","https://access.redhat.com/errata/RHSA-2024:1903","https://access.redhat.com/errata/RHSA-2024:1959","https://access.redhat.com/errata/RHSA-2024:2086","https://access.redhat.com/security/cve/CVE-2023-40551","https://bugzilla.redhat.com/show_bug.cgi?id=2259918","https://access.redhat.com/errata/RHSA-2024:1834","https://access.redhat.com/errata/RHSA-2024:1835","https://access.redhat.com/errata/RHSA-2024:1873","https://access.redhat.com/errata/RHSA-2024:1876","https://access.redhat.com/errata/RHSA-2024:1883","https://access.redhat.com/errata/RHSA-2024:1902","https://access.redhat.com/errata/RHSA-2024:1903","https://access.redhat.com/errata/RHSA-2024:1959","https://access.redhat.com/errata/RHSA-2024:2086","https://access.redhat.com/security/cve/CVE-2023-40551","https://bugzilla.redhat.com/show_bug.cgi?id=2259918","https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html"],"published_time":"2024-01-29T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40548","summary":"A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.09214,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:1834","https://access.redhat.com/errata/RHSA-2024:1835","https://access.redhat.com/errata/RHSA-2024:1873","https://access.redhat.com/errata/RHSA-2024:1876","https://access.redhat.com/errata/RHSA-2024:1883","https://access.redhat.com/errata/RHSA-2024:1902","https://access.redhat.com/errata/RHSA-2024:1903","https://access.redhat.com/errata/RHSA-2024:1959","https://access.redhat.com/errata/RHSA-2024:2086","https://access.redhat.com/security/cve/CVE-2023-40548","https://bugzilla.redhat.com/show_bug.cgi?id=2241782","https://access.redhat.com/errata/RHSA-2024:1834","https://access.redhat.com/errata/RHSA-2024:1835","https://access.redhat.com/errata/RHSA-2024:1873","https://access.redhat.com/errata/RHSA-2024:1876","https://access.redhat.com/errata/RHSA-2024:1883","https://access.redhat.com/errata/RHSA-2024:1902","https://access.redhat.com/errata/RHSA-2024:1903","https://access.redhat.com/errata/RHSA-2024:1959","https://access.redhat.com/errata/RHSA-2024:2086","https://access.redhat.com/security/cve/CVE-2023-40548","https://bugzilla.redhat.com/show_bug.cgi?id=2241782","https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html"],"published_time":"2024-01-29T15:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-46838","summary":"Transmit requests in Xen's virtual network protocol can consist of\nmultiple parts.  While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all.  Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments.  Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.32222,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGEKT4DKSDXDS34EL7M4UVJMMPH7Z3ZZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFYW6R64GPLUOXSQBJI3JBUX3HGLAYPP/","https://xenbits.xenproject.org/xsa/advisory-448.html","http://xenbits.xen.org/xsa/advisory-448.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGEKT4DKSDXDS34EL7M4UVJMMPH7Z3ZZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFYW6R64GPLUOXSQBJI3JBUX3HGLAYPP/","https://xenbits.xenproject.org/xsa/advisory-448.html"],"published_time":"2024-01-29T11:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0809","summary":"Inappropriate implementation in Autofill in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12302,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1497985","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1497985","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"],"published_time":"2024-01-24T00:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0811","summary":"Inappropriate implementation in Extensions API in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00338,"ranking_epss":0.56658,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1494490","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1494490","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"],"published_time":"2024-01-24T00:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0812","summary":"Inappropriate implementation in Accessibility in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00329,"ranking_epss":0.559,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1484394","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1484394","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"],"published_time":"2024-01-24T00:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0813","summary":"Use after free in Reading Mode in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00076,"ranking_epss":0.22773,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1477151","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1477151","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"],"published_time":"2024-01-24T00:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0814","summary":"Incorrect security UI in Payments in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00129,"ranking_epss":0.32253,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1463935","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1463935","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"],"published_time":"2024-01-24T00:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0804","summary":"Insufficient policy enforcement in iOS Security UI in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00113,"ranking_epss":0.29817,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1515137","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1515137","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"],"published_time":"2024-01-24T00:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0805","summary":"Inappropriate implementation in Downloads in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to perform domain spoofing via a crafted domain name. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00134,"ranking_epss":0.3301,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1514925","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1514925","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"],"published_time":"2024-01-24T00:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0806","summary":"Use after free in Passwords in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00329,"ranking_epss":0.559,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1505176","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1505176","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"],"published_time":"2024-01-24T00:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0807","summary":"Use after free in Web Audio in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00253,"ranking_epss":0.48706,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1505080","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1505080","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"],"published_time":"2024-01-24T00:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0808","summary":"Integer underflow in WebUI in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a malicious file. (Chromium security severity: High)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00344,"ranking_epss":0.57072,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1504936","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","https://crbug.com/1504936","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"],"published_time":"2024-01-24T00:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39197","summary":"An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.","cvss":4.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.0,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11514,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-39197","https://bugzilla.redhat.com/show_bug.cgi?id=2218342","https://access.redhat.com/security/cve/CVE-2023-39197","https://bugzilla.redhat.com/show_bug.cgi?id=2218342"],"published_time":"2024-01-23T03:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-22420","summary":"JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. This vulnerability depends on user interaction by opening a malicious Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab version 4.0.11 has been patched. Users are advised to upgrade. Users unable to upgrade should disable the table of contents extension.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00343,"ranking_epss":0.56989,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/jupyterlab/jupyterlab/commit/e1b3aabab603878e46add445a3114e838411d2df","https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4m77-cmpx-vjc4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/","https://github.com/jupyterlab/jupyterlab/commit/e1b3aabab603878e46add445a3114e838411d2df","https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4m77-cmpx-vjc4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/"],"published_time":"2024-01-19T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-22421","summary":"JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix.","cvss":7.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.6,"cvss_v4":null,"epss":0.00138,"ranking_epss":0.33891,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/jupyterlab/jupyterlab/commit/19bd9b96cb2e77170a67e43121637d0b5619e8c6","https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-44cc-43rp-5947","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/","https://github.com/jupyterlab/jupyterlab/commit/19bd9b96cb2e77170a67e43121637d0b5619e8c6","https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-44cc-43rp-5947","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/"],"published_time":"2024-01-19T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0408","summary":"A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.04147,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0320","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2170","https://access.redhat.com/errata/RHSA-2024:2995","https://access.redhat.com/errata/RHSA-2024:2996","https://access.redhat.com/security/cve/CVE-2024-0408","https://bugzilla.redhat.com/show_bug.cgi?id=2257689","https://access.redhat.com/errata/RHSA-2024:0320","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2170","https://access.redhat.com/errata/RHSA-2024:2995","https://access.redhat.com/errata/RHSA-2024:2996","https://access.redhat.com/security/cve/CVE-2024-0408","https://bugzilla.redhat.com/show_bug.cgi?id=2257689","https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/","https://security.gentoo.org/glsa/202401-30","https://security.netapp.com/advisory/ntap-20240307-0006/"],"published_time":"2024-01-18T16:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0409","summary":"A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.03005,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0320","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2170","https://access.redhat.com/errata/RHSA-2024:2995","https://access.redhat.com/errata/RHSA-2024:2996","https://access.redhat.com/security/cve/CVE-2024-0409","https://bugzilla.redhat.com/show_bug.cgi?id=2257690","https://access.redhat.com/errata/RHSA-2024:0320","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2170","https://access.redhat.com/errata/RHSA-2024:2995","https://access.redhat.com/errata/RHSA-2024:2996","https://access.redhat.com/security/cve/CVE-2024-0409","https://bugzilla.redhat.com/show_bug.cgi?id=2257690","https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/","https://security.gentoo.org/glsa/202401-30","https://security.netapp.com/advisory/ntap-20240307-0006/"],"published_time":"2024-01-18T16:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0607","summary":"A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00019,"ranking_epss":0.05143,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2024-0607","https://bugzilla.redhat.com/show_bug.cgi?id=2258635","https://github.com/torvalds/linux/commit/c301f0981fdd3fd1ffac6836b423c4d7a8e0eb63","https://access.redhat.com/security/cve/CVE-2024-0607","https://bugzilla.redhat.com/show_bug.cgi?id=2258635","https://github.com/torvalds/linux/commit/c301f0981fdd3fd1ffac6836b423c4d7a8e0eb63","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"],"published_time":"2024-01-18T16:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6816","summary":"A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.03264,"ranking_epss":0.87167,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0320","https://access.redhat.com/errata/RHSA-2024:0557","https://access.redhat.com/errata/RHSA-2024:0558","https://access.redhat.com/errata/RHSA-2024:0597","https://access.redhat.com/errata/RHSA-2024:0607","https://access.redhat.com/errata/RHSA-2024:0614","https://access.redhat.com/errata/RHSA-2024:0617","https://access.redhat.com/errata/RHSA-2024:0621","https://access.redhat.com/errata/RHSA-2024:0626","https://access.redhat.com/errata/RHSA-2024:0629","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2170","https://access.redhat.com/errata/RHSA-2024:2995","https://access.redhat.com/errata/RHSA-2024:2996","https://access.redhat.com/errata/RHSA-2025:12751","https://access.redhat.com/security/cve/CVE-2023-6816","https://bugzilla.redhat.com/show_bug.cgi?id=2257691","http://www.openwall.com/lists/oss-security/2024/01/18/1","https://access.redhat.com/errata/RHSA-2024:0320","https://access.redhat.com/errata/RHSA-2024:0557","https://access.redhat.com/errata/RHSA-2024:0558","https://access.redhat.com/errata/RHSA-2024:0597","https://access.redhat.com/errata/RHSA-2024:0607","https://access.redhat.com/errata/RHSA-2024:0614","https://access.redhat.com/errata/RHSA-2024:0617","https://access.redhat.com/errata/RHSA-2024:0621","https://access.redhat.com/errata/RHSA-2024:0626","https://access.redhat.com/errata/RHSA-2024:0629","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2170","https://access.redhat.com/errata/RHSA-2024:2996","https://access.redhat.com/security/cve/CVE-2023-6816","https://bugzilla.redhat.com/show_bug.cgi?id=2257691","https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/","https://security.gentoo.org/glsa/202401-30","https://security.netapp.com/advisory/ntap-20240307-0006/"],"published_time":"2024-01-18T05:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0517","summary":"Out of bounds write in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.7313,"ranking_epss":0.98792,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html","https://crbug.com/1515930","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html","https://crbug.com/1515930","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/","https://www.vicarius.io/vsociety/posts/out-of-bound-write-in-v8-javascript-engine-cve-2024-0517"],"published_time":"2024-01-16T22:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0518","summary":"Type confusion in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00219,"ranking_epss":0.4457,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html","https://crbug.com/1507412","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html","https://crbug.com/1507412","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/"],"published_time":"2024-01-16T22:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0519","summary":"Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00142,"ranking_epss":0.3447,"kev":true,"propose_action":"Google Chromium V8 Engine contains an out-of-bounds memory access vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html","https://crbug.com/1517354","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/","https://www.couchbase.com/alerts/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html","https://crbug.com/1517354","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/","https://www.couchbase.com/alerts/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-0519"],"published_time":"2024-01-16T22:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6395","summary":"The Mock software contains a vulnerability wherein an attacker could potentially exploit privilege escalation, enabling the execution of arbitrary code with root user privileges. This weakness stems from the absence of proper sandboxing during the expansion and execution of Jinja2 templates, which may be included in certain configuration parameters. While the Mock documentation advises treating users added to the mock group as privileged, certain build systems invoking mock on behalf of users might inadvertently permit less privileged users to define configuration tags. These tags could then be passed as parameters to mock during execution, potentially leading to the utilization of Jinja2 templates for remote privilege escalation and the execution of arbitrary code as the root user on the build server.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.0067,"ranking_epss":0.7138,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/01/16/1","http://www.openwall.com/lists/oss-security/2024/01/16/3","https://access.redhat.com/security/cve/CVE-2023-6395","https://bugzilla.redhat.com/show_bug.cgi?id=2252206","https://github.com/xsuchy/templated-dictionary/commit/0740bd0ca8d487301881541028977d120f8b8933","https://github.com/xsuchy/templated-dictionary/commit/bcd90f0dafa365575c4b101e6f5d98c4ef4e4b69","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SP2BJC2AFLFJJAEHPGZ3ZINTBTI7AN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBFYREAJH4T7GXXQZ4GJEREN4Q3AHS3K/","http://www.openwall.com/lists/oss-security/2024/01/16/1","http://www.openwall.com/lists/oss-security/2024/01/16/3","https://access.redhat.com/security/cve/CVE-2023-6395","https://bugzilla.redhat.com/show_bug.cgi?id=2252206","https://github.com/xsuchy/templated-dictionary/commit/0740bd0ca8d487301881541028977d120f8b8933","https://github.com/xsuchy/templated-dictionary/commit/bcd90f0dafa365575c4b101e6f5d98c4ef4e4b69","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SP2BJC2AFLFJJAEHPGZ3ZINTBTI7AN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBFYREAJH4T7GXXQZ4GJEREN4Q3AHS3K/"],"published_time":"2024-01-16T15:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0232","summary":"A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00018,"ranking_epss":0.04501,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2024-0232","https://bugzilla.redhat.com/show_bug.cgi?id=2243754","https://access.redhat.com/security/cve/CVE-2024-0232","https://bugzilla.redhat.com/show_bug.cgi?id=2243754","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","https://security.netapp.com/advisory/ntap-20240315-0007/"],"published_time":"2024-01-16T14:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0567","summary":"A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01605,"ranking_epss":0.81758,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0533","https://access.redhat.com/errata/RHSA-2024:1082","https://access.redhat.com/errata/RHSA-2024:1383","https://access.redhat.com/errata/RHSA-2024:2094","https://access.redhat.com/security/cve/CVE-2024-0567","https://bugzilla.redhat.com/show_bug.cgi?id=2258544","https://gitlab.com/gnutls/gnutls/-/issues/1521","https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html","http://www.openwall.com/lists/oss-security/2024/01/19/3","https://access.redhat.com/errata/RHSA-2024:0533","https://access.redhat.com/errata/RHSA-2024:1082","https://access.redhat.com/errata/RHSA-2024:1383","https://access.redhat.com/errata/RHSA-2024:2094","https://access.redhat.com/security/cve/CVE-2024-0567","https://bugzilla.redhat.com/show_bug.cgi?id=2258544","https://gitlab.com/gnutls/gnutls/-/issues/1521","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/","https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html","https://security.netapp.com/advisory/ntap-20240202-0011/"],"published_time":"2024-01-16T14:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0553","summary":"A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01029,"ranking_epss":0.77345,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0533","https://access.redhat.com/errata/RHSA-2024:0627","https://access.redhat.com/errata/RHSA-2024:0796","https://access.redhat.com/errata/RHSA-2024:1082","https://access.redhat.com/errata/RHSA-2024:1108","https://access.redhat.com/errata/RHSA-2024:1383","https://access.redhat.com/errata/RHSA-2024:2094","https://access.redhat.com/security/cve/CVE-2024-0553","https://bugzilla.redhat.com/show_bug.cgi?id=2258412","https://gitlab.com/gnutls/gnutls/-/issues/1522","https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html","http://www.openwall.com/lists/oss-security/2024/01/19/3","https://access.redhat.com/errata/RHSA-2024:0533","https://access.redhat.com/errata/RHSA-2024:0627","https://access.redhat.com/errata/RHSA-2024:0796","https://access.redhat.com/errata/RHSA-2024:1082","https://access.redhat.com/errata/RHSA-2024:1108","https://access.redhat.com/errata/RHSA-2024:1383","https://access.redhat.com/errata/RHSA-2024:2094","https://access.redhat.com/security/cve/CVE-2024-0553","https://bugzilla.redhat.com/show_bug.cgi?id=2258412","https://gitlab.com/gnutls/gnutls/-/issues/1522","https://lists.debian.org/debian-lts-announce/2024/02/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/","https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html","https://security.netapp.com/advisory/ntap-20240202-0011/"],"published_time":"2024-01-16T12:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4001","summary":"An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the \"/boot/\" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08934,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0437","https://access.redhat.com/errata/RHSA-2024:0456","https://access.redhat.com/errata/RHSA-2024:0468","https://access.redhat.com/security/cve/CVE-2023-4001","https://bugzilla.redhat.com/show_bug.cgi?id=2224951","https://dfir.ru/2024/01/15/cve-2023-4001-a-vulnerability-in-the-downstream-grub-boot-manager/","http://www.openwall.com/lists/oss-security/2024/01/15/3","https://access.redhat.com/errata/RHSA-2024:0437","https://access.redhat.com/errata/RHSA-2024:0456","https://access.redhat.com/errata/RHSA-2024:0468","https://access.redhat.com/security/cve/CVE-2023-4001","https://bugzilla.redhat.com/show_bug.cgi?id=2224951","https://dfir.ru/2024/01/15/cve-2023-4001-a-vulnerability-in-the-downstream-grub-boot-manager/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OBADMKHQLJOBA32Q7XPNSYMVHVAFDCB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHLZQ47HM64NDOHMHYO7VIJFYD5ZPPYN/","https://security.netapp.com/advisory/ntap-20240216-0006/"],"published_time":"2024-01-15T11:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-23301","summary":"Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.001,"ranking_epss":0.27664,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/rear/rear/issues/3122","https://github.com/rear/rear/pull/3123","https://lists.debian.org/debian-lts-announce/2024/02/msg00003.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JIN57LUPBI2GDJOK3PYXNHJTZT3AQTZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHKMPXJNXEJJE6EVYE5HM7EKEJFQMBN7/","https://github.com/rear/rear/issues/3122","https://github.com/rear/rear/pull/3123","https://lists.debian.org/debian-lts-announce/2024/02/msg00003.html","https://lists.debian.org/debian-lts-announce/2025/12/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JIN57LUPBI2GDJOK3PYXNHJTZT3AQTZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHKMPXJNXEJJE6EVYE5HM7EKEJFQMBN7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7JIN57LUPBI2GDJOK3PYXNHJTZT3AQTZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHKMPXJNXEJJE6EVYE5HM7EKEJFQMBN7/"],"published_time":"2024-01-12T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0443","summary":"A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is called when the blkcg reference count reaches 0. This circular dependency will prevent blkcg and some blkgs from being freed after they are made offline. This issue may allow an attacker with a local access to cause system instability, such as an out of memory error.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02226,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/errata/RHSA-2023:7077","https://access.redhat.com/errata/RHSA-2023:7370","https://access.redhat.com/security/cve/CVE-2024-0443","https://bugzilla.redhat.com/show_bug.cgi?id=2257968","https://lore.kernel.org/linux-block/20221215033132.230023-3-longman@redhat.com/","https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/errata/RHSA-2023:7077","https://access.redhat.com/errata/RHSA-2023:7370","https://access.redhat.com/security/cve/CVE-2024-0443","https://bugzilla.redhat.com/show_bug.cgi?id=2257968","https://lore.kernel.org/linux-block/20221215033132.230023-3-longman@redhat.com/"],"published_time":"2024-01-12T00:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0333","summary":"Insufficient data validation in Extensions in Google Chrome prior to 120.0.6099.216 allowed an attacker in a privileged network position to install a malicious extension via a crafted HTML page. (Chromium security severity: High)","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.2248,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_9.html","https://crbug.com/1513379","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BXC7FJIAZRY3P72XC4Z4UOW2QDA7YX7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPYCYENYQYADCOS6XG4JITUVRZ6HTE2B/","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_9.html","https://crbug.com/1513379","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BXC7FJIAZRY3P72XC4Z4UOW2QDA7YX7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPYCYENYQYADCOS6XG4JITUVRZ6HTE2B/"],"published_time":"2024-01-10T22:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41056","summary":"Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.06792,"ranking_epss":0.91341,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/redis/redis/releases/tag/7.0.15","https://github.com/redis/redis/releases/tag/7.2.4","https://github.com/redis/redis/security/advisories/GHSA-xr47-pcmx-fq2m","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JTGQJ2YLYB24B72I5B5H32YIMPVSWIT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTWHPLC3RI67VNRDOIXLDVNC5YMYBMQN/","https://security.netapp.com/advisory/ntap-20240223-0003/","https://github.com/redis/redis/releases/tag/7.0.15","https://github.com/redis/redis/releases/tag/7.2.4","https://github.com/redis/redis/security/advisories/GHSA-xr47-pcmx-fq2m","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JTGQJ2YLYB24B72I5B5H32YIMPVSWIT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTWHPLC3RI67VNRDOIXLDVNC5YMYBMQN/","https://security.netapp.com/advisory/ntap-20240223-0003/"],"published_time":"2024-01-10T16:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5455","summary":"A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00304,"ranking_epss":0.53691,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0137","https://access.redhat.com/errata/RHSA-2024:0138","https://access.redhat.com/errata/RHSA-2024:0139","https://access.redhat.com/errata/RHSA-2024:0140","https://access.redhat.com/errata/RHSA-2024:0141","https://access.redhat.com/errata/RHSA-2024:0142","https://access.redhat.com/errata/RHSA-2024:0143","https://access.redhat.com/errata/RHSA-2024:0144","https://access.redhat.com/errata/RHSA-2024:0145","https://access.redhat.com/security/cve/CVE-2023-5455","https://bugzilla.redhat.com/show_bug.cgi?id=2242828","https://www.freeipa.org/release-notes/4-10-3.html","https://www.freeipa.org/release-notes/4-11-1.html","https://www.freeipa.org/release-notes/4-6-10.html","https://www.freeipa.org/release-notes/4-9-14.html","https://access.redhat.com/errata/RHSA-2024:0137","https://access.redhat.com/errata/RHSA-2024:0138","https://access.redhat.com/errata/RHSA-2024:0139","https://access.redhat.com/errata/RHSA-2024:0140","https://access.redhat.com/errata/RHSA-2024:0141","https://access.redhat.com/errata/RHSA-2024:0142","https://access.redhat.com/errata/RHSA-2024:0143","https://access.redhat.com/errata/RHSA-2024:0144","https://access.redhat.com/errata/RHSA-2024:0145","https://access.redhat.com/errata/RHSA-2024:0252","https://access.redhat.com/security/cve/CVE-2023-5455","https://bugzilla.redhat.com/show_bug.cgi?id=2242828","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U76DAZZVY7V4XQBOOV5ETPTHW3A6MW5O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFNUQH7IOHTKCTKQWFHONWGUBOUANL6I/","https://www.freeipa.org/release-notes/4-10-3.html","https://www.freeipa.org/release-notes/4-11-1.html","https://www.freeipa.org/release-notes/4-6-10.html","https://www.freeipa.org/release-notes/4-9-14.html"],"published_time":"2024-01-10T13:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-3600","summary":"It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00161,"ranking_epss":0.37,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600","https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90","https://ubuntu.com/security/notices/USN-5003-1","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600","https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90","https://ubuntu.com/security/notices/USN-5003-1"],"published_time":"2024-01-08T19:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-22049","summary":"httparty before 0.21.0 is vulnerable to an assumed-immutable web parameter vulnerability. A remote and unauthenticated attacker can provide a crafted filename parameter during multipart/form-data uploads which could result in attacker controlled filenames being written.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0119,"ranking_epss":0.78852,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/advisories/GHSA-5pq7-52mg-hr42","https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43","https://github.com/jnunemaker/httparty/commit/cdb45a678c43e44570b4e73f84b1abeb5ec22b8e","https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42","https://lists.debian.org/debian-lts-announce/2024/01/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4LDGAVPR4KB72V4GGQCWODEAI72QZI3V/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOWECZPJY6JZIA5FSBJR77KCRDXWDZDA/","https://vulncheck.com/advisories/vc-advisory-GHSA-5pq7-52mg-hr42","https://github.com/advisories/GHSA-5pq7-52mg-hr42","https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43","https://github.com/jnunemaker/httparty/commit/cdb45a678c43e44570b4e73f84b1abeb5ec22b8e","https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42","https://lists.debian.org/debian-lts-announce/2024/01/msg00011.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4LDGAVPR4KB72V4GGQCWODEAI72QZI3V/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOWECZPJY6JZIA5FSBJR77KCRDXWDZDA/","https://vulncheck.com/advisories/vc-advisory-GHSA-5pq7-52mg-hr42"],"published_time":"2024-01-04T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6270","summary":"A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06211,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-6270","https://bugzilla.redhat.com/show_bug.cgi?id=2256786","https://access.redhat.com/security/cve/CVE-2023-6270","https://bugzilla.redhat.com/show_bug.cgi?id=2256786","https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"],"published_time":"2024-01-04T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0224","summary":"Use after free in WebAudio in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00447,"ranking_epss":0.6356,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html","https://crbug.com/1505086","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","https://security.gentoo.org/glsa/202401-34","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html","https://crbug.com/1505086","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","https://security.gentoo.org/glsa/202401-34"],"published_time":"2024-01-04T02:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0225","summary":"Use after free in WebGPU in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00643,"ranking_epss":0.7067,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html","https://crbug.com/1506923","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","https://security.gentoo.org/glsa/202401-34","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html","https://crbug.com/1506923","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","https://security.gentoo.org/glsa/202401-34"],"published_time":"2024-01-04T02:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0222","summary":"Use after free in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00443,"ranking_epss":0.63375,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html","https://crbug.com/1501798","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","https://security.gentoo.org/glsa/202401-34","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html","https://crbug.com/1501798","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","https://security.gentoo.org/glsa/202401-34"],"published_time":"2024-01-04T02:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0223","summary":"Heap buffer overflow in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.09619,"ranking_epss":0.92899,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html","https://crbug.com/1505009","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","https://security.gentoo.org/glsa/202401-34","https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html","https://crbug.com/1505009","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","https://security.gentoo.org/glsa/202401-34"],"published_time":"2024-01-04T02:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0217","summary":"A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory region can be reused for other allocations and any previously stored data in this memory region is considered lost.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02102,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2024-0217","https://bugzilla.redhat.com/show_bug.cgi?id=2256624","https://github.com/PackageKit/PackageKit/commit/64278c9127e3333342b56ead99556161f7e86f79","https://access.redhat.com/security/cve/CVE-2024-0217","https://bugzilla.redhat.com/show_bug.cgi?id=2256624","https://github.com/PackageKit/PackageKit/commit/64278c9127e3333342b56ead99556161f7e86f79"],"published_time":"2024-01-03T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6004","summary":"A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.","cvss":4.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15788,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2504","https://access.redhat.com/errata/RHSA-2024:3233","https://access.redhat.com/security/cve/CVE-2023-6004","https://bugzilla.redhat.com/show_bug.cgi?id=2251110","https://www.libssh.org/security/advisories/CVE-2023-6004.txt","https://access.redhat.com/errata/RHSA-2024:2504","https://access.redhat.com/errata/RHSA-2024:3233","https://access.redhat.com/security/cve/CVE-2023-6004","https://bugzilla.redhat.com/show_bug.cgi?id=2251110","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/","https://security.netapp.com/advisory/ntap-20240223-0004/","https://www.libssh.org/security/advisories/CVE-2023-6004.txt"],"published_time":"2024-01-03T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6693","summary":"A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06845,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2962","https://access.redhat.com/errata/RHSA-2025:4492","https://access.redhat.com/security/cve/CVE-2023-6693","https://bugzilla.redhat.com/show_bug.cgi?id=2254580","https://access.redhat.com/errata/RHSA-2024:2962","https://access.redhat.com/security/cve/CVE-2023-6693","https://bugzilla.redhat.com/show_bug.cgi?id=2254580","https://lists.debian.org/debian-lts-announce/2025/04/msg00042.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGUN5HVOXESW7MSNM44E4AE2VNXQB6Y/","https://security.netapp.com/advisory/ntap-20240208-0004/"],"published_time":"2024-01-02T10:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-7104","summary":"A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.","cvss":5.5,"cvss_version":3.0,"cvss_v2":5.2,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00129,"ranking_epss":0.32329,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","https://security.netapp.com/advisory/ntap-20240112-0008/","https://sqlite.org/forum/forumpost/5bcbf4571c","https://sqlite.org/src/info/0e4e7a05c4204b47","https://vuldb.com/?ctiid.248999","https://vuldb.com/?id.248999","https://lists.debian.org/debian-lts-announce/2024/09/msg00050.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","https://security.netapp.com/advisory/ntap-20240112-0008/","https://sqlite.org/forum/forumpost/5bcbf4571c","https://sqlite.org/src/info/0e4e7a05c4204b47","https://vuldb.com/?ctiid.248999","https://vuldb.com/?id.248999"],"published_time":"2023-12-29T10:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6879","summary":"Increasing the resolution of video frames, while performing a multi-threaded encode, can result in a heap overflow in av1_loop_restoration_dealloc().","cvss":9.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.0,"cvss_v4":null,"epss":0.00155,"ranking_epss":0.36264,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://aomedia.googlesource.com/aom/+/refs/tags/v3.7.1","https://crbug.com/aomedia/3491","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","https://aomedia.googlesource.com/aom/+/refs/tags/v3.7.1","https://crbug.com/aomedia/3491","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/"],"published_time":"2023-12-27T23:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-7101","summary":"Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.83314,"ranking_epss":0.99274,"kev":true,"propose_action":"Spreadsheet::ParseExcel contains a remote code execution vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings within the Excel parsing logic.","ransomware_campaign":"Unknown","references":["http://www.openwall.com/lists/oss-security/2023/12/29/4","https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171","https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md","https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc","https://https://github.com/jmcnamara/spreadsheet-parseexcel/commit/bd3159277e745468e2c553417b35d5d7dc7405bc","https://https://metacpan.org/dist/Spreadsheet-ParseExcel","https://https://www.cve.org/CVERecord?id=CVE-2023-7101","https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFEHKULQRVXHIV7XXK2RGD4VQN6Y4CV5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2FIWDHRYTAAQLGM6AFOZVM7AFZ4H2ZR/","https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html","http://www.openwall.com/lists/oss-security/2023/12/29/4","https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171","https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md","https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc","https://https://github.com/jmcnamara/spreadsheet-parseexcel/commit/bd3159277e745468e2c553417b35d5d7dc7405bc","https://https://metacpan.org/dist/Spreadsheet-ParseExcel","https://https://www.cve.org/CVERecord?id=CVE-2023-7101","https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFEHKULQRVXHIV7XXK2RGD4VQN6Y4CV5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2FIWDHRYTAAQLGM6AFOZVM7AFZ4H2ZR/","https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-7101"],"published_time":"2023-12-24T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-51767","summary":"OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. NOTE: this is disputed by the Supplier, who states \"we do not consider it to be the application's responsibility to defend against platform architectural weaknesses.\"","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":7e-05,"ranking_epss":0.0044,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-51767","https://arxiv.org/abs/2309.02545","https://bugzilla.redhat.com/show_bug.cgi?id=2255850","https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77","https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878","https://security.netapp.com/advisory/ntap-20240125-0006/","https://ubuntu.com/security/CVE-2023-51767","https://www.openwall.com/lists/oss-security/2025/09/22/1","http://www.openwall.com/lists/oss-security/2025/09/22/1","http://www.openwall.com/lists/oss-security/2025/09/22/2","http://www.openwall.com/lists/oss-security/2025/09/23/1","http://www.openwall.com/lists/oss-security/2025/09/23/3","http://www.openwall.com/lists/oss-security/2025/09/23/4","http://www.openwall.com/lists/oss-security/2025/09/23/5","http://www.openwall.com/lists/oss-security/2025/09/24/4","http://www.openwall.com/lists/oss-security/2025/09/24/7","http://www.openwall.com/lists/oss-security/2025/09/25/2","http://www.openwall.com/lists/oss-security/2025/09/25/6","http://www.openwall.com/lists/oss-security/2025/09/26/2","http://www.openwall.com/lists/oss-security/2025/09/26/4","http://www.openwall.com/lists/oss-security/2025/09/27/1","http://www.openwall.com/lists/oss-security/2025/09/27/2","http://www.openwall.com/lists/oss-security/2025/09/27/3","http://www.openwall.com/lists/oss-security/2025/09/27/4","http://www.openwall.com/lists/oss-security/2025/09/27/5","http://www.openwall.com/lists/oss-security/2025/09/27/6","http://www.openwall.com/lists/oss-security/2025/09/27/7","http://www.openwall.com/lists/oss-security/2025/09/28/7","http://www.openwall.com/lists/oss-security/2025/09/29/1","http://www.openwall.com/lists/oss-security/2025/09/29/4","http://www.openwall.com/lists/oss-security/2025/09/29/5","http://www.openwall.com/lists/oss-security/2025/09/29/6","http://www.openwall.com/lists/oss-security/2025/10/01/1","http://www.openwall.com/lists/oss-security/2025/10/01/2","https://access.redhat.com/security/cve/CVE-2023-51767","https://arxiv.org/abs/2309.02545","https://bugzilla.redhat.com/show_bug.cgi?id=2255850","https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77","https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878","https://security.netapp.com/advisory/ntap-20240125-0006/","https://ubuntu.com/security/CVE-2023-51767"],"published_time":"2023-12-24T07:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-51766","summary":"Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.01642,"ranking_epss":0.8199,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/12/24/1","http://www.openwall.com/lists/oss-security/2023/12/25/1","http://www.openwall.com/lists/oss-security/2023/12/29/2","http://www.openwall.com/lists/oss-security/2024/01/01/1","http://www.openwall.com/lists/oss-security/2024/01/01/2","http://www.openwall.com/lists/oss-security/2024/01/01/3","https://bugs.exim.org/show_bug.cgi?id=3063","https://bugzilla.redhat.com/show_bug.cgi?id=2255852","https://exim.org/static/doc/security/CVE-2023-51766.txt","https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html","https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca","https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5","https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766","https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/","https://lwn.net/Articles/956533/","https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/","https://www.openwall.com/lists/oss-security/2023/12/23/2","https://www.youtube.com/watch?v=V8KPV96g1To","http://www.openwall.com/lists/oss-security/2023/12/24/1","http://www.openwall.com/lists/oss-security/2023/12/25/1","http://www.openwall.com/lists/oss-security/2023/12/29/2","http://www.openwall.com/lists/oss-security/2024/01/01/1","http://www.openwall.com/lists/oss-security/2024/01/01/2","http://www.openwall.com/lists/oss-security/2024/01/01/3","https://bugs.exim.org/show_bug.cgi?id=3063","https://bugzilla.redhat.com/show_bug.cgi?id=2255852","https://exim.org/static/doc/security/CVE-2023-51766.txt","https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html","https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca","https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5","https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766","https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/","https://lwn.net/Articles/956533/","https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/","https://www.openwall.com/lists/oss-security/2023/12/23/2","https://www.youtube.com/watch?v=V8KPV96g1To"],"published_time":"2023-12-24T06:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-51764","summary":"Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.27062,"ranking_epss":0.96386,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/12/24/1","http://www.openwall.com/lists/oss-security/2023/12/25/1","http://www.openwall.com/lists/oss-security/2024/05/09/3","https://access.redhat.com/security/cve/CVE-2023-51764","https://bugzilla.redhat.com/show_bug.cgi?id=2255563","https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html","https://github.com/duy-31/CVE-2023-51764","https://github.com/eeenvik1/CVE-2023-51764","https://lists.debian.org/debian-lts-announce/2024/01/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ5WXFCW2N6G2PH3JXDTYW5PH5EBQEGO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRLF5SOS7TP5N7FQSEK2NFNB44ISVTZC/","https://lwn.net/Articles/956533/","https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/","https://www.openwall.com/lists/oss-security/2024/01/22/1","https://www.postfix.org/announcements/postfix-3.8.5.html","https://www.postfix.org/smtp-smuggling.html","https://www.youtube.com/watch?v=V8KPV96g1To","http://www.openwall.com/lists/oss-security/2023/12/24/1","http://www.openwall.com/lists/oss-security/2023/12/25/1","http://www.openwall.com/lists/oss-security/2024/05/09/3","https://access.redhat.com/security/cve/CVE-2023-51764","https://bugzilla.redhat.com/show_bug.cgi?id=2255563","https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html","https://github.com/duy-31/CVE-2023-51764","https://github.com/eeenvik1/CVE-2023-51764","https://lists.debian.org/debian-lts-announce/2024/01/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ5WXFCW2N6G2PH3JXDTYW5PH5EBQEGO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRLF5SOS7TP5N7FQSEK2NFNB44ISVTZC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQ5WXFCW2N6G2PH3JXDTYW5PH5EBQEGO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRLF5SOS7TP5N7FQSEK2NFNB44ISVTZC/","https://lwn.net/Articles/956533/","https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/","https://www.openwall.com/lists/oss-security/2024/01/22/1","https://www.postfix.org/announcements/postfix-3.8.5.html","https://www.postfix.org/smtp-smuggling.html","https://www.youtube.com/watch?v=V8KPV96g1To"],"published_time":"2023-12-24T05:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-7024","summary":"Heap buffer overflow in WebRTC in Google Chrome prior to 120.0.6099.129 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02866,"ranking_epss":0.8628,"kev":true,"propose_action":"Google Chromium WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could impact web browsers using WebRTC, including but not limited to Google Chrome.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html","https://crbug.com/1513170","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5585","https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html","https://crbug.com/1513170","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5585","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-7024"],"published_time":"2023-12-21T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6546","summary":"A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00328,"ranking_epss":0.55862,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0930","https://access.redhat.com/errata/RHSA-2024:0937","https://access.redhat.com/errata/RHSA-2024:1018","https://access.redhat.com/errata/RHSA-2024:1019","https://access.redhat.com/errata/RHSA-2024:1055","https://access.redhat.com/errata/RHSA-2024:1250","https://access.redhat.com/errata/RHSA-2024:1253","https://access.redhat.com/errata/RHSA-2024:1306","https://access.redhat.com/errata/RHSA-2024:1607","https://access.redhat.com/errata/RHSA-2024:1612","https://access.redhat.com/errata/RHSA-2024:1614","https://access.redhat.com/errata/RHSA-2024:2093","https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2621","https://access.redhat.com/errata/RHSA-2024:2697","https://access.redhat.com/errata/RHSA-2024:4577","https://access.redhat.com/errata/RHSA-2024:4729","https://access.redhat.com/errata/RHSA-2024:4731","https://access.redhat.com/errata/RHSA-2024:4970","https://access.redhat.com/security/cve/CVE-2023-6546","https://bugzilla.redhat.com/show_bug.cgi?id=2255498","https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3","https://www.zerodayinitiative.com/advisories/ZDI-CAN-20527","http://www.openwall.com/lists/oss-security/2024/04/10/18","http://www.openwall.com/lists/oss-security/2024/04/10/21","http://www.openwall.com/lists/oss-security/2024/04/11/7","http://www.openwall.com/lists/oss-security/2024/04/11/9","http://www.openwall.com/lists/oss-security/2024/04/12/1","http://www.openwall.com/lists/oss-security/2024/04/12/2","http://www.openwall.com/lists/oss-security/2024/04/16/2","http://www.openwall.com/lists/oss-security/2024/04/17/1","https://access.redhat.com/errata/RHSA-2024:0930","https://access.redhat.com/errata/RHSA-2024:0937","https://access.redhat.com/errata/RHSA-2024:1018","https://access.redhat.com/errata/RHSA-2024:1019","https://access.redhat.com/errata/RHSA-2024:1055","https://access.redhat.com/errata/RHSA-2024:1250","https://access.redhat.com/errata/RHSA-2024:1253","https://access.redhat.com/errata/RHSA-2024:1306","https://access.redhat.com/errata/RHSA-2024:1607","https://access.redhat.com/errata/RHSA-2024:1612","https://access.redhat.com/errata/RHSA-2024:1614","https://access.redhat.com/errata/RHSA-2024:2093","https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2621","https://access.redhat.com/errata/RHSA-2024:2697","https://access.redhat.com/errata/RHSA-2024:4577","https://access.redhat.com/errata/RHSA-2024:4729","https://access.redhat.com/errata/RHSA-2024:4731","https://access.redhat.com/security/cve/CVE-2023-6546","https://bugzilla.redhat.com/show_bug.cgi?id=2255498","https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3","https://www.zerodayinitiative.com/advisories/ZDI-CAN-20527"],"published_time":"2023-12-21T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4255","summary":"An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.0563,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2255207","https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3","https://github.com/tats/w3m/issues/268","https://github.com/tats/w3m/pull/273","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/","https://bugzilla.redhat.com/show_bug.cgi?id=2255207","https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3","https://github.com/tats/w3m/issues/268","https://github.com/tats/w3m/pull/273","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/"],"published_time":"2023-12-21T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4256","summary":"Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the tcpedit_dlt_cleanup() function within plugins/dlt_plugins.c. This vulnerability can be exploited by supplying a specifically crafted file to the tcprewrite binary. This flaw enables a local attacker to initiate a Denial of Service (DoS) attack.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00019,"ranking_epss":0.0493,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2255212","https://github.com/appneta/tcpreplay/issues/813","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EHUILQV2YJI5TXXXJA5FQ2HJQGFT7NTN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMW5CIODKRHUUH7NTAYIRWGSJ56DTGXM/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3GYCHPVJ2VFN3D7FI4IRMDVMILLWBRF/","https://bugzilla.redhat.com/show_bug.cgi?id=2255212","https://github.com/appneta/tcpreplay/issues/813","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EHUILQV2YJI5TXXXJA5FQ2HJQGFT7NTN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMW5CIODKRHUUH7NTAYIRWGSJ56DTGXM/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3GYCHPVJ2VFN3D7FI4IRMDVMILLWBRF/"],"published_time":"2023-12-21T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6918","summary":"A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.","cvss":3.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00363,"ranking_epss":0.58434,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2504","https://access.redhat.com/errata/RHSA-2024:3233","https://access.redhat.com/security/cve/CVE-2023-6918","https://bugzilla.redhat.com/show_bug.cgi?id=2254997","https://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/","https://www.libssh.org/security/advisories/CVE-2023-6918.txt","https://access.redhat.com/errata/RHSA-2024:2504","https://access.redhat.com/errata/RHSA-2024:3233","https://access.redhat.com/security/cve/CVE-2023-6918","https://bugzilla.redhat.com/show_bug.cgi?id=2254997","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/","https://security.netapp.com/advisory/ntap-20250214-0009/","https://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/","https://www.libssh.org/security/advisories/CVE-2023-6918.txt"],"published_time":"2023-12-19T00:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-48795","summary":"The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.5673,"ranking_epss":0.98136,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html","http://seclists.org/fulldisclosure/2024/Mar/21","http://www.openwall.com/lists/oss-security/2023/12/18/3","http://www.openwall.com/lists/oss-security/2023/12/19/5","http://www.openwall.com/lists/oss-security/2023/12/20/3","http://www.openwall.com/lists/oss-security/2024/03/06/3","http://www.openwall.com/lists/oss-security/2024/04/17/8","https://access.redhat.com/security/cve/cve-2023-48795","https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/","https://bugs.gentoo.org/920280","https://bugzilla.redhat.com/show_bug.cgi?id=2254210","https://bugzilla.suse.com/show_bug.cgi?id=1217950","https://crates.io/crates/thrussh/versions","https://filezilla-project.org/versions.php","https://forum.netgate.com/topic/184941/terrapin-ssh-attack","https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6","https://github.com/NixOS/nixpkgs/pull/275249","https://github.com/PowerShell/Win32-OpenSSH/issues/2189","https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta","https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0","https://github.com/TeraTermProject/teraterm/releases/tag/v5.1","https://github.com/advisories/GHSA-45x7-px36-x8w8","https://github.com/apache/mina-sshd/issues/445","https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab","https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22","https://github.com/cyd01/KiTTY/issues/520","https://github.com/drakkan/sftpgo/releases/tag/v2.5.6","https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42","https://github.com/erlang/otp/releases/tag/OTP-26.2.1","https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d","https://github.com/hierynomus/sshj/issues/916","https://github.com/janmojzis/tinyssh/issues/81","https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5","https://github.com/libssh2/libssh2/pull/1291","https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25","https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3","https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15","https://github.com/mwiede/jsch/issues/457","https://github.com/mwiede/jsch/pull/461","https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16","https://github.com/openssh/openssh-portable/commits/master","https://github.com/paramiko/paramiko/issues/2337","https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES","https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES","https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES","https://github.com/proftpd/proftpd/issues/456","https://github.com/rapier1/hpn-ssh/releases","https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst","https://github.com/ronf/asyncssh/tags","https://github.com/ssh-mitm/ssh-mitm/issues/165","https://github.com/warp-tech/russh/releases/tag/v0.40.2","https://gitlab.com/libssh/libssh-mirror/-/tags","https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ","https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg","https://help.panic.com/releasenotes/transmit5/","https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/","https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html","https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/","https://matt.ucc.asn.au/dropbear/CHANGES","https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC","https://news.ycombinator.com/item?id=38684904","https://news.ycombinator.com/item?id=38685286","https://news.ycombinator.com/item?id=38732005","https://nova.app/releases/#v11.8","https://oryx-embedded.com/download/#changelog","https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002","https://roumenpetrov.info/secsh/#news20231220","https://security-tracker.debian.org/tracker/CVE-2023-48795","https://security-tracker.debian.org/tracker/source-package/libssh2","https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg","https://security-tracker.debian.org/tracker/source-package/trilead-ssh2","https://security.gentoo.org/glsa/202312-16","https://security.gentoo.org/glsa/202312-17","https://security.netapp.com/advisory/ntap-20240105-0004/","https://support.apple.com/kb/HT214084","https://thorntech.com/cve-2023-48795-and-sftp-gateway/","https://twitter.com/TrueSkrillor/status/1736774389725565005","https://ubuntu.com/security/CVE-2023-48795","https://winscp.net/eng/docs/history#6.2.2","https://www.bitvise.com/ssh-client-version-history#933","https://www.bitvise.com/ssh-server-version-history","https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html","https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update","https://www.debian.org/security/2023/dsa-5586","https://www.debian.org/security/2023/dsa-5588","https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc","https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508","https://www.netsarang.com/en/xshell-update-history/","https://www.openssh.com/openbsd.html","https://www.openssh.com/txt/release-9.6","https://www.openwall.com/lists/oss-security/2023/12/18/2","https://www.openwall.com/lists/oss-security/2023/12/20/3","https://www.paramiko.org/changelog.html","https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/","https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/","https://www.terrapin-attack.com","https://www.theregister.com/2023/12/20/terrapin_attack_ssh","https://www.vandyke.com/products/securecrt/history.txt","http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html","http://seclists.org/fulldisclosure/2024/Mar/21","http://www.openwall.com/lists/oss-security/2023/12/18/3","http://www.openwall.com/lists/oss-security/2023/12/19/5","http://www.openwall.com/lists/oss-security/2023/12/20/3","http://www.openwall.com/lists/oss-security/2024/03/06/3","http://www.openwall.com/lists/oss-security/2024/04/17/8","https://access.redhat.com/security/cve/cve-2023-48795","https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/","https://bugs.gentoo.org/920280","https://bugzilla.redhat.com/show_bug.cgi?id=2254210","https://bugzilla.suse.com/show_bug.cgi?id=1217950","https://crates.io/crates/thrussh/versions","https://filezilla-project.org/versions.php","https://forum.netgate.com/topic/184941/terrapin-ssh-attack","https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6","https://github.com/NixOS/nixpkgs/pull/275249","https://github.com/PowerShell/Win32-OpenSSH/issues/2189","https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta","https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0","https://github.com/TeraTermProject/teraterm/releases/tag/v5.1","https://github.com/advisories/GHSA-45x7-px36-x8w8","https://github.com/apache/mina-sshd/issues/445","https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab","https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22","https://github.com/cyd01/KiTTY/issues/520","https://github.com/drakkan/sftpgo/releases/tag/v2.5.6","https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42","https://github.com/erlang/otp/releases/tag/OTP-26.2.1","https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d","https://github.com/hierynomus/sshj/issues/916","https://github.com/janmojzis/tinyssh/issues/81","https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5","https://github.com/libssh2/libssh2/pull/1291","https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25","https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3","https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15","https://github.com/mwiede/jsch/issues/457","https://github.com/mwiede/jsch/pull/461","https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16","https://github.com/openssh/openssh-portable/commits/master","https://github.com/paramiko/paramiko/issues/2337","https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES","https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES","https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES","https://github.com/proftpd/proftpd/issues/456","https://github.com/rapier1/hpn-ssh/releases","https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst","https://github.com/ronf/asyncssh/tags","https://github.com/ssh-mitm/ssh-mitm/issues/165","https://github.com/warp-tech/russh/releases/tag/v0.40.2","https://gitlab.com/libssh/libssh-mirror/-/tags","https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ","https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg","https://help.panic.com/releasenotes/transmit5/","https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/","https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html","https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html","https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html","https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/","https://matt.ucc.asn.au/dropbear/CHANGES","https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC","https://news.ycombinator.com/item?id=38684904","https://news.ycombinator.com/item?id=38685286","https://news.ycombinator.com/item?id=38732005","https://nova.app/releases/#v11.8","https://oryx-embedded.com/download/#changelog","https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002","https://roumenpetrov.info/secsh/#news20231220","https://security-tracker.debian.org/tracker/CVE-2023-48795","https://security-tracker.debian.org/tracker/source-package/libssh2","https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg","https://security-tracker.debian.org/tracker/source-package/trilead-ssh2","https://security.gentoo.org/glsa/202312-16","https://security.gentoo.org/glsa/202312-17","https://security.netapp.com/advisory/ntap-20240105-0004/","https://support.apple.com/kb/HT214084","https://thorntech.com/cve-2023-48795-and-sftp-gateway/","https://twitter.com/TrueSkrillor/status/1736774389725565005","https://ubuntu.com/security/CVE-2023-48795","https://winscp.net/eng/docs/history#6.2.2","https://www.bitvise.com/ssh-client-version-history#933","https://www.bitvise.com/ssh-server-version-history","https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html","https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update","https://www.debian.org/security/2023/dsa-5586","https://www.debian.org/security/2023/dsa-5588","https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc","https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508","https://www.netsarang.com/en/xshell-update-history/","https://www.openssh.com/openbsd.html","https://www.openssh.com/txt/release-9.6","https://www.openwall.com/lists/oss-security/2023/12/18/2","https://www.openwall.com/lists/oss-security/2023/12/20/3","https://www.paramiko.org/changelog.html","https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/","https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/","https://www.terrapin-attack.com","https://www.theregister.com/2023/12/20/terrapin_attack_ssh","https://www.vandyke.com/products/securecrt/history.txt","https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit","https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability"],"published_time":"2023-12-18T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-47038","summary":"A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00108,"ranking_epss":0.28966,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2228","https://access.redhat.com/errata/RHSA-2024:3128","https://access.redhat.com/security/cve/CVE-2023-47038","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746","https://bugzilla.redhat.com/show_bug.cgi?id=2249523","https://access.redhat.com/errata/RHSA-2024:2228","https://access.redhat.com/errata/RHSA-2024:3128","https://access.redhat.com/security/cve/CVE-2023-47038","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746","https://bugzilla.redhat.com/show_bug.cgi?id=2249523","https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010","https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6","https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3","https://github.com/aquasecurity/trivy/discussions/8400","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMDZZ4SCEW6FRWZDMXGAKZ35THTAWFG6/","https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property","https://ubuntu.com/security/CVE-2023-47100","https://www.suse.com/security/cve/CVE-2023-47100.html"],"published_time":"2023-12-18T14:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6702","summary":"Type confusion in V8 in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.51688,"ranking_epss":0.97907,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html","https://crbug.com/1501326","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/","https://security.gentoo.org/glsa/202401-34","https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html","https://crbug.com/1501326","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGJ732QHS2FAYF62RFF3YP4VIQY75K7V/","https://security.gentoo.org/glsa/202401-34"],"published_time":"2023-12-14T22:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5764","summary":"A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce templating injection when supplying templating data.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21609,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:7773","https://access.redhat.com/security/cve/CVE-2023-5764","https://bugzilla.redhat.com/show_bug.cgi?id=2247629","https://access.redhat.com/errata/RHSA-2023:7773","https://access.redhat.com/security/cve/CVE-2023-5764","https://bugzilla.redhat.com/show_bug.cgi?id=2247629","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7Q6CHPVCHMZS5M7V22GOKFSXZAQ24EU/","https://security.netapp.com/advisory/ntap-20241025-0001/"],"published_time":"2023-12-12T22:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-46219","summary":"When saving HSTS data to an excessively long file name, curl could end up\nremoving all contents, making subsequent requests using that file unaware of\nthe HSTS status they should otherwise use.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00203,"ranking_epss":0.42434,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://curl.se/docs/CVE-2023-46219.html","https://hackerone.com/reports/2236133","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/","https://security.netapp.com/advisory/ntap-20240119-0007/","https://www.debian.org/security/2023/dsa-5587","https://curl.se/docs/CVE-2023-46219.html","https://hackerone.com/reports/2236133","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/","https://security.netapp.com/advisory/ntap-20240119-0007/","https://www.debian.org/security/2023/dsa-5587"],"published_time":"2023-12-12T02:15:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6679","summary":"A null pointer dereference vulnerability was found in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c in the Digital Phase Locked Loop (DPLL) subsystem in the  Linux kernel. This issue could be exploited to trigger a denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.01986,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0439","https://access.redhat.com/errata/RHSA-2024:0448","https://access.redhat.com/errata/RHSA-2024:0461","https://access.redhat.com/security/cve/CVE-2023-6679","https://bugzilla.redhat.com/show_bug.cgi?id=2253986","https://lore.kernel.org/netdev/20231211083758.1082853-1-jiri@resnulli.us/","https://access.redhat.com/errata/RHSA-2024:0439","https://access.redhat.com/errata/RHSA-2024:0448","https://access.redhat.com/errata/RHSA-2024:0461","https://access.redhat.com/security/cve/CVE-2023-6679","https://bugzilla.redhat.com/show_bug.cgi?id=2253986","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LBVHM4LGMFIHBN4UBESYRFMYX3WUICV5/","https://lore.kernel.org/netdev/20231211083758.1082853-1-jiri@resnulli.us/"],"published_time":"2023-12-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6185","summary":"Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins.\n\nIn affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.","cvss":8.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.3,"cvss_v4":null,"epss":0.01215,"ranking_epss":0.79043,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/","https://www.debian.org/security/2023/dsa-5574","https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185","https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/","https://www.debian.org/security/2023/dsa-5574","https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185"],"published_time":"2023-12-11T12:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6186","summary":"Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning.\n\nIn affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.","cvss":8.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.3,"cvss_v4":null,"epss":0.01287,"ranking_epss":0.79662,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/","https://www.debian.org/security/2023/dsa-5574","https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186","https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/","https://www.debian.org/security/2023/dsa-5574","https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186"],"published_time":"2023-12-11T12:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6622","summary":"A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00011,"ranking_epss":0.01408,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-6622","https://bugzilla.redhat.com/show_bug.cgi?id=2253632","https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea","https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-6622","https://bugzilla.redhat.com/show_bug.cgi?id=2253632","https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAOVK2F3ALGKYIQ5IOMAYEC2DGI7BWAW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3AGDVE3KBLOOYBPISFDS74R4YAZEDAY/"],"published_time":"2023-12-08T18:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-45866","summary":"Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.34352,"ranking_epss":0.96999,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://changelogs.ubuntu.com/changelogs/pool/main/b/bluez/bluez_5.64-0ubuntu1/changelog","http://seclists.org/fulldisclosure/2023/Dec/7","http://seclists.org/fulldisclosure/2023/Dec/9","https://bluetooth.com","https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/input?id=25a471a83e02e1effb15d5a488b3f0085eaeb675","https://github.com/skysafe/reblog/tree/main/cve-2023-45866","https://lists.debian.org/debian-lts-announce/2023/12/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77YQQS5FXPYE6WBBZO3REFIRAUJHERFA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2N2P5LMP3V7IJONALV2KOFL4NUU23CJ/","https://security.gentoo.org/glsa/202401-03","https://support.apple.com/kb/HT214035","https://support.apple.com/kb/HT214036","https://www.debian.org/security/2023/dsa-5584","http://changelogs.ubuntu.com/changelogs/pool/main/b/bluez/bluez_5.64-0ubuntu1/changelog","http://seclists.org/fulldisclosure/2023/Dec/7","http://seclists.org/fulldisclosure/2023/Dec/9","https://bluetooth.com","https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/input?id=25a471a83e02e1effb15d5a488b3f0085eaeb675","https://github.com/skysafe/reblog/tree/main/cve-2023-45866","https://lists.debian.org/debian-lts-announce/2023/12/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77YQQS5FXPYE6WBBZO3REFIRAUJHERFA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2N2P5LMP3V7IJONALV2KOFL4NUU23CJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/77YQQS5FXPYE6WBBZO3REFIRAUJHERFA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2N2P5LMP3V7IJONALV2KOFL4NUU23CJ/","https://security.gentoo.org/glsa/202401-03","https://support.apple.com/kb/HT214035","https://support.apple.com/kb/HT214036","https://www.debian.org/security/2023/dsa-5584"],"published_time":"2023-12-08T06:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-46218","summary":"This flaw allows a malicious HTTP server to set \"super cookies\" in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl's function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00398,"ranking_epss":0.60637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://curl.se/docs/CVE-2023-46218.html","https://hackerone.com/reports/2212193","https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/","https://security.netapp.com/advisory/ntap-20240125-0007/","https://www.debian.org/security/2023/dsa-5587","https://curl.se/docs/CVE-2023-46218.html","https://hackerone.com/reports/2212193","https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/","https://security.netapp.com/advisory/ntap-20240125-0007/","https://www.debian.org/security/2023/dsa-5587"],"published_time":"2023-12-07T01:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6508","summary":"Use after free in Media Stream in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00684,"ranking_epss":0.71694,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html","https://crbug.com/1497984","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5573","https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html","https://crbug.com/1497984","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5573"],"published_time":"2023-12-06T02:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6509","summary":"Use after free in Side Panel Search in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00927,"ranking_epss":0.76102,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html","https://crbug.com/1494565","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5573","https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html","https://crbug.com/1494565","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5573"],"published_time":"2023-12-06T02:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6510","summary":"Use after free in Media Capture in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00927,"ranking_epss":0.76102,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html","https://crbug.com/1480152","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5573","https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html","https://crbug.com/1480152","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5573"],"published_time":"2023-12-06T02:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6511","summary":"Inappropriate implementation in Autofill in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00202,"ranking_epss":0.42302,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html","https://crbug.com/1478613","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5573","https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html","https://crbug.com/1478613","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5573"],"published_time":"2023-12-06T02:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6512","summary":"Inappropriate implementation in Web Browser UI in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to potentially spoof the contents of an iframe dialog context menu via a crafted HTML page. (Chromium security severity: Low)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.005,"ranking_epss":0.66,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html","https://crbug.com/1457702","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5573","https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html","https://crbug.com/1457702","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5573"],"published_time":"2023-12-06T02:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-42916","summary":"An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00047,"ranking_epss":0.14545,"kev":true,"propose_action":"Apple iOS, iPadOS, macOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.","ransomware_campaign":"Unknown","references":["http://seclists.org/fulldisclosure/2023/Dec/12","http://seclists.org/fulldisclosure/2023/Dec/13","http://seclists.org/fulldisclosure/2023/Dec/3","http://seclists.org/fulldisclosure/2023/Dec/4","http://seclists.org/fulldisclosure/2023/Dec/5","http://seclists.org/fulldisclosure/2023/Dec/8","http://seclists.org/fulldisclosure/2024/Jan/35","http://www.openwall.com/lists/oss-security/2023/12/05/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/","https://security.gentoo.org/glsa/202401-04","https://support.apple.com/en-us/HT214031","https://support.apple.com/en-us/HT214032","https://support.apple.com/en-us/HT214033","https://support.apple.com/kb/HT214033","https://support.apple.com/kb/HT214034","https://support.apple.com/kb/HT214062","https://www.debian.org/security/2023/dsa-5575","http://seclists.org/fulldisclosure/2023/Dec/12","http://seclists.org/fulldisclosure/2023/Dec/13","http://seclists.org/fulldisclosure/2023/Dec/3","http://seclists.org/fulldisclosure/2023/Dec/4","http://seclists.org/fulldisclosure/2023/Dec/5","http://seclists.org/fulldisclosure/2023/Dec/8","http://seclists.org/fulldisclosure/2024/Jan/35","http://www.openwall.com/lists/oss-security/2023/12/05/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/","https://security.gentoo.org/glsa/202401-04","https://support.apple.com/en-us/HT214031","https://support.apple.com/en-us/HT214032","https://support.apple.com/en-us/HT214033","https://support.apple.com/kb/HT214033","https://support.apple.com/kb/HT214034","https://support.apple.com/kb/HT214062","https://www.debian.org/security/2023/dsa-5575","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-42916"],"published_time":"2023-11-30T23:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-42917","summary":"A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.20837,"kev":true,"propose_action":"Apple iOS, iPadOS, macOS, and Safari WebKit contain a memory corruption vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.","ransomware_campaign":"Unknown","references":["http://seclists.org/fulldisclosure/2023/Dec/12","http://seclists.org/fulldisclosure/2023/Dec/13","http://seclists.org/fulldisclosure/2023/Dec/3","http://seclists.org/fulldisclosure/2023/Dec/4","http://seclists.org/fulldisclosure/2023/Dec/5","http://seclists.org/fulldisclosure/2023/Dec/8","http://seclists.org/fulldisclosure/2024/Jan/35","http://www.openwall.com/lists/oss-security/2023/12/05/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/","https://security.gentoo.org/glsa/202401-04","https://support.apple.com/en-us/HT214031","https://support.apple.com/en-us/HT214032","https://support.apple.com/en-us/HT214033","https://support.apple.com/kb/HT214033","https://support.apple.com/kb/HT214034","https://support.apple.com/kb/HT214062","https://www.debian.org/security/2023/dsa-5575","http://seclists.org/fulldisclosure/2023/Dec/12","http://seclists.org/fulldisclosure/2023/Dec/13","http://seclists.org/fulldisclosure/2023/Dec/3","http://seclists.org/fulldisclosure/2023/Dec/4","http://seclists.org/fulldisclosure/2023/Dec/5","http://seclists.org/fulldisclosure/2023/Dec/8","http://seclists.org/fulldisclosure/2024/Jan/35","http://www.openwall.com/lists/oss-security/2023/12/05/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/","https://security.gentoo.org/glsa/202401-04","https://support.apple.com/en-us/HT214031","https://support.apple.com/en-us/HT214032","https://support.apple.com/en-us/HT214033","https://support.apple.com/kb/HT214033","https://support.apple.com/kb/HT214034","https://support.apple.com/kb/HT214062","https://www.debian.org/security/2023/dsa-5575","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-42917"],"published_time":"2023-11-30T23:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6345","summary":"Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.0072,"ranking_epss":0.72526,"kev":true,"propose_action":"Google Chromium Skia contains an integer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a malicious file. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1505053","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569","https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1505053","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-6345"],"published_time":"2023-11-29T12:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6346","summary":"Use after free in WebAudio in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00356,"ranking_epss":0.57942,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1500856","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569","https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1500856","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569"],"published_time":"2023-11-29T12:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6347","summary":"Use after free in Mojo in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00368,"ranking_epss":0.58747,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1494461","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569","https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1494461","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569"],"published_time":"2023-11-29T12:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6348","summary":"Type Confusion in Spellcheck in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00605,"ranking_epss":0.69658,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/176368/Chrome-BindTextSuggestionHostForFrame-Type-Confusion.html","https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1491459","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569","http://packetstormsecurity.com/files/176368/Chrome-BindTextSuggestionHostForFrame-Type-Confusion.html","https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1491459","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569"],"published_time":"2023-11-29T12:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6350","summary":"Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0124,"ranking_epss":0.79261,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1501766","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569","https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1501766","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569"],"published_time":"2023-11-29T12:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6351","summary":"Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43428,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1501770","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569","https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html","https://crbug.com/1501770","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5569"],"published_time":"2023-11-29T12:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5981","summary":"A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00916,"ranking_epss":0.75944,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:0155","https://access.redhat.com/errata/RHSA-2024:0319","https://access.redhat.com/errata/RHSA-2024:0399","https://access.redhat.com/errata/RHSA-2024:0451","https://access.redhat.com/errata/RHSA-2024:0533","https://access.redhat.com/errata/RHSA-2024:1383","https://access.redhat.com/errata/RHSA-2024:2094","https://access.redhat.com/security/cve/CVE-2023-5981","https://bugzilla.redhat.com/show_bug.cgi?id=2248445","https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23","http://www.openwall.com/lists/oss-security/2024/01/19/3","https://access.redhat.com/errata/RHSA-2024:0155","https://access.redhat.com/errata/RHSA-2024:0319","https://access.redhat.com/errata/RHSA-2024:0399","https://access.redhat.com/errata/RHSA-2024:0451","https://access.redhat.com/errata/RHSA-2024:0533","https://access.redhat.com/errata/RHSA-2024:1383","https://access.redhat.com/errata/RHSA-2024:2094","https://access.redhat.com/security/cve/CVE-2023-5981","https://bugzilla.redhat.com/show_bug.cgi?id=2248445","https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23","https://lists.debian.org/debian-lts-announce/2023/11/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/"],"published_time":"2023-11-28T12:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6277","summary":"An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0375,"ranking_epss":0.8804,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-6277","https://bugzilla.redhat.com/show_bug.cgi?id=2251311","https://gitlab.com/libtiff/libtiff/-/issues/614","https://gitlab.com/libtiff/libtiff/-/merge_requests/545","http://seclists.org/fulldisclosure/2024/Jul/16","http://seclists.org/fulldisclosure/2024/Jul/17","http://seclists.org/fulldisclosure/2024/Jul/18","http://seclists.org/fulldisclosure/2024/Jul/19","http://seclists.org/fulldisclosure/2024/Jul/20","http://seclists.org/fulldisclosure/2024/Jul/21","http://seclists.org/fulldisclosure/2024/Jul/22","http://seclists.org/fulldisclosure/2024/Jul/23","https://access.redhat.com/security/cve/CVE-2023-6277","https://bugzilla.redhat.com/show_bug.cgi?id=2251311","https://gitlab.com/libtiff/libtiff/-/issues/614","https://gitlab.com/libtiff/libtiff/-/merge_requests/545","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJIN6DTSL3VODZUGWEUXLEL5DR53EZMV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7ZGN2MZXJ6E57W3L4YBM3ZPAU3T7T5C/","https://security.netapp.com/advisory/ntap-20240119-0002/","https://support.apple.com/kb/HT214116","https://support.apple.com/kb/HT214117","https://support.apple.com/kb/HT214118","https://support.apple.com/kb/HT214119","https://support.apple.com/kb/HT214120","https://support.apple.com/kb/HT214122","https://support.apple.com/kb/HT214123","https://support.apple.com/kb/HT214124"],"published_time":"2023-11-24T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5972","summary":"A null pointer dereference flaw was found in the nft_inner.c functionality of netfilter in the Linux kernel. This issue could allow a local user to crash the system or escalate their privileges on the system.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-5972","https://bugzilla.redhat.com/show_bug.cgi?id=2248189","https://github.com/torvalds/linux/commit/505ce0630ad5d31185695f8a29dde8d29f28faa7","https://github.com/torvalds/linux/commit/52177bbf19e6e9398375a148d2e13ed492b40b80","https://access.redhat.com/security/cve/CVE-2023-5972","https://bugzilla.redhat.com/show_bug.cgi?id=2248189","https://github.com/torvalds/linux/commit/505ce0630ad5d31185695f8a29dde8d29f28faa7","https://github.com/torvalds/linux/commit/52177bbf19e6e9398375a148d2e13ed492b40b80"],"published_time":"2023-11-23T18:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6238","summary":"A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02754,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-6238","https://bugzilla.redhat.com/show_bug.cgi?id=2250834","https://access.redhat.com/security/cve/CVE-2023-6238","https://bugzilla.redhat.com/show_bug.cgi?id=2250834"],"published_time":"2023-11-21T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5341","summary":"A heap use-after-free flaw was found in coders/bmp.c in ImageMagick.","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00033,"ranking_epss":0.09506,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-5341","https://bugzilla.redhat.com/show_bug.cgi?id=2241774","https://github.com/ImageMagick/ImageMagick/commit/aa673b2e4defc7cad5bec16c4fc8324f71e531f1","https://access.redhat.com/security/cve/CVE-2023-5341","https://bugzilla.redhat.com/show_bug.cgi?id=2241774","https://github.com/ImageMagick/ImageMagick/commit/aa673b2e4defc7cad5bec16c4fc8324f71e531f1","https://lists.debian.org/debian-lts-announce/2024/02/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LICYTADFJAFPZW3Y2MKNCJIUYODPAG4L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAULDP3GG5KI3XITQ5XSMRSILCBZS2VK/"],"published_time":"2023-11-19T10:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-48234","summary":"Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":2.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.8,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18499,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/58f9befca1fa172068effad7f2ea5a9d6a7b0cca","https://github.com/vim/vim/security/advisories/GHSA-59gw-c949-6phq","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0004/","http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/58f9befca1fa172068effad7f2ea5a9d6a7b0cca","https://github.com/vim/vim/security/advisories/GHSA-59gw-c949-6phq","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0004/"],"published_time":"2023-11-16T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-48235","summary":"Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an\noverflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":2.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.8,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.20801,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200","https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0007/","http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200","https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0007/"],"published_time":"2023-11-16T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-48236","summary":"Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger\nthan MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":2.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.8,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11761,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/73b2d3790cad5694fc0ed0db2926e4220c48d968","https://github.com/vim/vim/security/advisories/GHSA-pr4c-932v-8hx5","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0002/","http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/73b2d3790cad5694fc0ed0db2926e4220c48d968","https://github.com/vim/vim/security/advisories/GHSA-pr4c-932v-8hx5","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0002/"],"published_time":"2023-11-16T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-48237","summary":"Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `6bf131888` which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":2.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.8,"cvss_v4":null,"epss":0.00053,"ranking_epss":0.16554,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/6bf131888a3d1de62bbfa8a7ea03c0ddccfd496e","https://github.com/vim/vim/security/advisories/GHSA-f2m2-v387-gv87","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0005/","http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/6bf131888a3d1de62bbfa8a7ea03c0ddccfd496e","https://github.com/vim/vim/security/advisories/GHSA-f2m2-v387-gv87","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0005/"],"published_time":"2023-11-16T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-48231","summary":"Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit `25aabc2b` which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":3.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.9,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.16178,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a","https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0008/","http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a","https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0008/"],"published_time":"2023-11-16T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-48232","summary":"Vim is an open source command line text editor. A floating point exception may occur when calculating the line offset for overlong lines and smooth scrolling is enabled and the cpo-settings include the 'n' flag. This may happen when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the 'cpo' setting includes the 'n' flag. Only users with non-default settings are affected and the exception should only result in a crash. This issue has been addressed in commit `cb0b99f0` which has been included in release version 9.0.2107. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":3.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.9,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23713,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/cb0b99f0672d8446585d26e998343dceca17d1ce","https://github.com/vim/vim/security/advisories/GHSA-f6cx-x634-hqpw","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0006/","http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/cb0b99f0672d8446585d26e998343dceca17d1ce","https://github.com/vim/vim/security/advisories/GHSA-f6cx-x634-hqpw","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0006/"],"published_time":"2023-11-16T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-48233","summary":"Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":2.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.8,"cvss_v4":null,"epss":0.00053,"ranking_epss":0.16554,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78","https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0003/","http://www.openwall.com/lists/oss-security/2023/11/16/1","https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78","https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/","https://security.netapp.com/advisory/ntap-20231227-0003/"],"published_time":"2023-11-16T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5997","summary":"Use after free in Garbage Collection in Google Chrome prior to 119.0.6045.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00403,"ranking_epss":0.60912,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html","https://crbug.com/1497997","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5556","https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html","https://crbug.com/1497997","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5556"],"published_time":"2023-11-15T18:15:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-6112","summary":"Use after free in Navigation in Google Chrome prior to 119.0.6045.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.22788,"ranking_epss":0.95894,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html","https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html","https://crbug.com/1499298","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5556","http://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html","https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html","https://crbug.com/1499298","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5556"],"published_time":"2023-11-15T18:15:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5528","summary":"A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.18507,"ranking_epss":0.95257,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/kubernetes/kubernetes/issues/121879","https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA","https://github.com/kubernetes/kubernetes/issues/121879","https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JH444PWZBINXLLFV7XLIJIZJHSK6UEZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XZIX727JIKF5RQW7RVVBLWXBCDIBJA7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MPGMITSZXUCAVO7Q75675SOLXC2XXU4/","https://security.netapp.com/advisory/ntap-20240119-0009/"],"published_time":"2023-11-14T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-46849","summary":"Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00478,"ranking_epss":0.65029,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://community.openvpn.net/openvpn/wiki/CVE-2023-46849","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/","https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/","https://www.debian.org/security/2023/dsa-5555","https://community.openvpn.net/openvpn/wiki/CVE-2023-46849","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/","https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/","https://www.debian.org/security/2023/dsa-5555"],"published_time":"2023-11-11T01:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-46850","summary":"Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02037,"ranking_epss":0.83852,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://community.openvpn.net/openvpn/wiki/CVE-2023-46850","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/","https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/","https://www.debian.org/security/2023/dsa-5555","https://community.openvpn.net/openvpn/wiki/CVE-2023-46850","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/","https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/","https://www.debian.org/security/2023/dsa-5555"],"published_time":"2023-11-11T01:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5543","summary":"When duplicating a BigBlueButton activity, the original meeting ID was also duplicated instead of using a new ID for the new activity. This could provide unintended access to the original meeting.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00088,"ranking_epss":0.25063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77795","https://bugzilla.redhat.com/show_bug.cgi?id=2243442","https://moodle.org/mod/forum/discuss.php?d=451584","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77795","https://bugzilla.redhat.com/show_bug.cgi?id=2243442","https://moodle.org/mod/forum/discuss.php?d=451584"],"published_time":"2023-11-09T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5551","summary":"Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.22086,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79310","https://bugzilla.redhat.com/show_bug.cgi?id=2243453","https://moodle.org/mod/forum/discuss.php?d=451592","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79310","https://bugzilla.redhat.com/show_bug.cgi?id=2243453","https://moodle.org/mod/forum/discuss.php?d=451592"],"published_time":"2023-11-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5546","summary":"ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.01765,"ranking_epss":0.8266,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78971","https://bugzilla.redhat.com/show_bug.cgi?id=2243445","https://moodle.org/mod/forum/discuss.php?d=451587","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78971","https://bugzilla.redhat.com/show_bug.cgi?id=2243445","https://moodle.org/mod/forum/discuss.php?d=451587"],"published_time":"2023-11-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5547","summary":"The course upload preview contained an XSS risk for users uploading unsafe data.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00139,"ranking_epss":0.3407,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79455","https://bugzilla.redhat.com/show_bug.cgi?id=2243447","https://moodle.org/mod/forum/discuss.php?d=451588","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79455","https://bugzilla.redhat.com/show_bug.cgi?id=2243447","https://moodle.org/mod/forum/discuss.php?d=451588"],"published_time":"2023-11-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5548","summary":"Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00277,"ranking_epss":0.51193,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77846","https://bugzilla.redhat.com/show_bug.cgi?id=2243449","https://moodle.org/mod/forum/discuss.php?d=451589","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77846","https://bugzilla.redhat.com/show_bug.cgi?id=2243449","https://moodle.org/mod/forum/discuss.php?d=451589"],"published_time":"2023-11-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5549","summary":"Insufficient web service capability checks made it possible to move categories a user had permission to manage, to a parent category they did not have the capability to manage.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00256,"ranking_epss":0.49013,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66730","https://bugzilla.redhat.com/show_bug.cgi?id=2243451","https://moodle.org/mod/forum/discuss.php?d=451590","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66730","https://bugzilla.redhat.com/show_bug.cgi?id=2243451","https://moodle.org/mod/forum/discuss.php?d=451590"],"published_time":"2023-11-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5550","summary":"In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01474,"ranking_epss":0.80993,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72249","https://bugzilla.redhat.com/show_bug.cgi?id=2243452","https://moodle.org/mod/forum/discuss.php?d=451591","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72249","https://bugzilla.redhat.com/show_bug.cgi?id=2243452","https://moodle.org/mod/forum/discuss.php?d=451591"],"published_time":"2023-11-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5540","summary":"A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.02012,"ranking_epss":0.83747,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79409","https://bugzilla.redhat.com/show_bug.cgi?id=2243432","https://moodle.org/mod/forum/discuss.php?d=451581","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79409","https://bugzilla.redhat.com/show_bug.cgi?id=2243432","https://moodle.org/mod/forum/discuss.php?d=451581"],"published_time":"2023-11-09T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5542","summary":"Students in \"Only see own membership\" groups could see other students in the group, which should be hidden.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00268,"ranking_epss":0.50364,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79213","https://bugzilla.redhat.com/show_bug.cgi?id=2243441","https://moodle.org/mod/forum/discuss.php?d=451583","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79213","https://bugzilla.redhat.com/show_bug.cgi?id=2243441","https://moodle.org/mod/forum/discuss.php?d=451583"],"published_time":"2023-11-09T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5544","summary":"Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00177,"ranking_epss":0.39249,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79509","https://bugzilla.redhat.com/show_bug.cgi?id=2243443","https://moodle.org/mod/forum/discuss.php?d=451585","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79509","https://bugzilla.redhat.com/show_bug.cgi?id=2243443","https://moodle.org/mod/forum/discuss.php?d=451585"],"published_time":"2023-11-09T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5545","summary":"H5P metadata automatically populated the author with the user's username, which could be sensitive information.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00277,"ranking_epss":0.51194,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78820","https://bugzilla.redhat.com/show_bug.cgi?id=2243444","https://moodle.org/mod/forum/discuss.php?d=451586","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78820","https://bugzilla.redhat.com/show_bug.cgi?id=2243444","https://moodle.org/mod/forum/discuss.php?d=451586"],"published_time":"2023-11-09T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39198","summary":"A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":8e-05,"ranking_epss":0.00685,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-39198","https://bugzilla.redhat.com/show_bug.cgi?id=2218332","https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-39198","https://bugzilla.redhat.com/show_bug.cgi?id=2218332","https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"],"published_time":"2023-11-09T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5539","summary":"A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.02012,"ranking_epss":0.83747,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79408","https://bugzilla.redhat.com/show_bug.cgi?id=2243352","https://moodle.org/mod/forum/discuss.php?d=451580","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79408","https://bugzilla.redhat.com/show_bug.cgi?id=2243352","https://moodle.org/mod/forum/discuss.php?d=451580"],"published_time":"2023-11-09T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5996","summary":"Use after free in WebAudio in Google Chrome prior to 119.0.6045.123 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0057,"ranking_epss":0.68652,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop.html","https://crbug.com/1497859","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5551","https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop.html","https://crbug.com/1497859","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5551"],"published_time":"2023-11-08T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4535","summary":"An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.","cvss":4.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.5,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45813,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:7879","https://access.redhat.com/security/cve/CVE-2023-4535","https://bugzilla.redhat.com/show_bug.cgi?id=2240914","https://github.com/OpenSC/OpenSC/commit/f1993dc4e0b33050b8f72a3558ee88b24c4063b2","https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651","https://github.com/OpenSC/OpenSC/releases/tag/0.24.0-rc1","https://github.com/OpenSC/OpenSC/wiki/OpenSC-security-advisories","https://access.redhat.com/errata/RHSA-2023:7879","https://access.redhat.com/security/cve/CVE-2023-4535","https://bugzilla.redhat.com/show_bug.cgi?id=2240914","https://github.com/OpenSC/OpenSC/commit/f1993dc4e0b33050b8f72a3558ee88b24c4063b2","https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651","https://github.com/OpenSC/OpenSC/releases/tag/0.24.0-rc1","https://github.com/OpenSC/OpenSC/wiki/OpenSC-security-advisories","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CPQOMCDWFRBMEFR5VK4N5MMXXU42ODE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLYEFIBBA37TK3UNMZN5NOJ7IWCIXLQP/"],"published_time":"2023-11-06T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-47272","summary":"Roundcube 1.5.x before 1.5.6 and 1.6.x before 1.6.5 allows XSS via a Content-Type or Content-Disposition header (used for attachment preview or download).","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00498,"ranking_epss":0.65929,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/roundcube/roundcubemail/commit/5ec496885e18ec6af956e8c0d627856c2257ba2d","https://github.com/roundcube/roundcubemail/releases/tag/1.5.6","https://github.com/roundcube/roundcubemail/releases/tag/1.6.5","https://lists.debian.org/debian-lts-announce/2023/12/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GILSR762MJB3BNJOVOCMW2JXEPV46IIQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YFRGBPET73URF6364CI547ZVWQESJLGK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4F4DUA3Q46ZVB2RD7BFP4XMNS4RYFFQ/","https://www.debian.org/security/2023/dsa-5572","https://github.com/roundcube/roundcubemail/commit/5ec496885e18ec6af956e8c0d627856c2257ba2d","https://github.com/roundcube/roundcubemail/releases/tag/1.5.6","https://github.com/roundcube/roundcubemail/releases/tag/1.6.5","https://lists.debian.org/debian-lts-announce/2023/12/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GILSR762MJB3BNJOVOCMW2JXEPV46IIQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YFRGBPET73URF6364CI547ZVWQESJLGK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4F4DUA3Q46ZVB2RD7BFP4XMNS4RYFFQ/","https://www.debian.org/security/2023/dsa-5572"],"published_time":"2023-11-06T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3961","summary":"A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.","cvss":9.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.1,"cvss_v4":null,"epss":0.01941,"ranking_epss":0.83465,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6209","https://access.redhat.com/errata/RHSA-2023:6744","https://access.redhat.com/errata/RHSA-2023:7371","https://access.redhat.com/errata/RHSA-2023:7408","https://access.redhat.com/errata/RHSA-2023:7464","https://access.redhat.com/errata/RHSA-2023:7467","https://access.redhat.com/security/cve/CVE-2023-3961","https://bugzilla.redhat.com/show_bug.cgi?id=2241881","https://bugzilla.samba.org/show_bug.cgi?id=15422","https://www.samba.org/samba/security/CVE-2023-3961.html","https://access.redhat.com/errata/RHSA-2023:6209","https://access.redhat.com/errata/RHSA-2023:6744","https://access.redhat.com/errata/RHSA-2023:7371","https://access.redhat.com/errata/RHSA-2023:7408","https://access.redhat.com/errata/RHSA-2023:7464","https://access.redhat.com/errata/RHSA-2023:7467","https://access.redhat.com/security/cve/CVE-2023-3961","https://bugzilla.redhat.com/show_bug.cgi?id=2241881","https://bugzilla.samba.org/show_bug.cgi?id=15422","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/","https://security.netapp.com/advisory/ntap-20231124-0002/","https://www.samba.org/samba/security/CVE-2023-3961.html"],"published_time":"2023-11-03T13:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4091","summary":"A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module \"acl_xattr\" is configured with \"acl_xattr:ignore system acls = yes\". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00476,"ranking_epss":0.64931,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6209","https://access.redhat.com/errata/RHSA-2023:6744","https://access.redhat.com/errata/RHSA-2023:7371","https://access.redhat.com/errata/RHSA-2023:7408","https://access.redhat.com/errata/RHSA-2023:7464","https://access.redhat.com/errata/RHSA-2023:7467","https://access.redhat.com/security/cve/CVE-2023-4091","https://bugzilla.redhat.com/show_bug.cgi?id=2241882","https://bugzilla.samba.org/show_bug.cgi?id=15439","https://www.samba.org/samba/security/CVE-2023-4091.html","https://access.redhat.com/errata/RHSA-2023:6209","https://access.redhat.com/errata/RHSA-2023:6744","https://access.redhat.com/errata/RHSA-2023:7371","https://access.redhat.com/errata/RHSA-2023:7408","https://access.redhat.com/errata/RHSA-2023:7464","https://access.redhat.com/errata/RHSA-2023:7467","https://access.redhat.com/security/cve/CVE-2023-4091","https://bugzilla.redhat.com/show_bug.cgi?id=2241882","https://bugzilla.samba.org/show_bug.cgi?id=15439","https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/","https://security.netapp.com/advisory/ntap-20231124-0002/","https://www.samba.org/samba/security/CVE-2023-4091.html"],"published_time":"2023-11-03T08:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1194","summary":"An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.0005,"ranking_epss":0.1551,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-1194","https://bugzilla.redhat.com/show_bug.cgi?id=2154176","https://security.netapp.com/advisory/ntap-20231221-0006/","https://www.spinics.net/lists/stable-commits/msg303065.html","https://access.redhat.com/security/cve/CVE-2023-1194","https://bugzilla.redhat.com/show_bug.cgi?id=2154176","https://security.netapp.com/advisory/ntap-20231221-0006/","https://www.spinics.net/lists/stable-commits/msg303065.html"],"published_time":"2023-11-03T08:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-42670","summary":"A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation \"classic DCs\") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as \"The procedure number is out of range\" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00385,"ranking_epss":0.59797,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-42670","https://bugzilla.redhat.com/show_bug.cgi?id=2241885","https://bugzilla.samba.org/show_bug.cgi?id=15473","https://www.samba.org/samba/security/CVE-2023-42670.html","https://access.redhat.com/security/cve/CVE-2023-42670","https://bugzilla.redhat.com/show_bug.cgi?id=2241885","https://bugzilla.samba.org/show_bug.cgi?id=15473","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/","https://security.netapp.com/advisory/ntap-20231124-0002/","https://www.samba.org/samba/security/CVE-2023-42670.html"],"published_time":"2023-11-03T08:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41914","summary":"SchedMD Slurm 23.02.x before 23.02.6 and 22.05.x before 22.05.10 allows filesystem race conditions for gaining ownership of a file, overwriting a file, or deleting files.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00061,"ranking_epss":0.18896,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OWKTCYZT3DXEH66QXQJYB7NI7ONDRS4M/","https://lists.schedmd.com/pipermail/slurm-announce/2023/000100.html","https://schedmd.com/security.php","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OWKTCYZT3DXEH66QXQJYB7NI7ONDRS4M/","https://lists.schedmd.com/pipermail/slurm-announce/2023/000100.html","https://schedmd.com/security.php"],"published_time":"2023-11-03T05:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43665","summary":"In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02194,"ranking_epss":0.84423,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/03/04/1","https://docs.djangoproject.com/en/4.2/releases/security/","https://groups.google.com/forum/#%21forum/django-announce","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/","https://security.netapp.com/advisory/ntap-20231221-0001/","https://www.djangoproject.com/weblog/2023/oct/04/security-releases/","http://www.openwall.com/lists/oss-security/2024/03/04/1","https://docs.djangoproject.com/en/4.2/releases/security/","https://groups.google.com/forum/#%21forum/django-announce","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/","https://security.netapp.com/advisory/ntap-20231221-0001/","https://www.djangoproject.com/weblog/2023/oct/04/security-releases/"],"published_time":"2023-11-03T05:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-44271","summary":"An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44438,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://devhub.checkmarx.com/cve-details/CVE-2023-44271/","https://github.com/python-pillow/Pillow/commit/1fe1bb49c452b0318cad12ea9d97c3bef188e9a7","https://github.com/python-pillow/Pillow/pull/7244","https://lists.debian.org/debian-lts-announce/2024/03/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2JOEDUJDQLCUII2LQYZYSM7RJL2I3P4/","https://devhub.checkmarx.com/cve-details/CVE-2023-44271/","https://github.com/python-pillow/Pillow/commit/1fe1bb49c452b0318cad12ea9d97c3bef188e9a7","https://github.com/python-pillow/Pillow/pull/7244","https://lists.debian.org/debian-lts-announce/2024/03/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2JOEDUJDQLCUII2LQYZYSM7RJL2I3P4/"],"published_time":"2023-11-03T05:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41164","summary":"In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00406,"ranking_epss":0.6112,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.djangoproject.com/en/4.2/releases/security/","https://groups.google.com/forum/#%21forum/django-announce","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/","https://security.netapp.com/advisory/ntap-20231214-0002/","https://www.djangoproject.com/weblog/2023/sep/04/security-releases/","https://docs.djangoproject.com/en/4.2/releases/security/","https://groups.google.com/forum/#%21forum/django-announce","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/","https://security.netapp.com/advisory/ntap-20231214-0002/","https://www.djangoproject.com/weblog/2023/sep/04/security-releases/"],"published_time":"2023-11-03T05:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5849","summary":"Integer overflow in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01138,"ranking_epss":0.78423,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1492384","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1492384","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5850","summary":"Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted domain name. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00864,"ranking_epss":0.7513,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1281972","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1281972","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5851","summary":"Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00437,"ranking_epss":0.63129,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1473957","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1473957","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5852","summary":"Use after free in Printing in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00524,"ranking_epss":0.67017,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1480852","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1480852","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5853","summary":"Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00668,"ranking_epss":0.71335,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1456876","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1456876","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5854","summary":"Use after free in Profiles in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00524,"ranking_epss":0.67017,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1488267","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1488267","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5855","summary":"Use after free in Reading Mode in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00524,"ranking_epss":0.67017,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1492396","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1492396","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5856","summary":"Use after free in Side Panel in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00524,"ranking_epss":0.67017,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1493380","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1493380","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5857","summary":"Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially execute arbitrary code via a malicious file. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01245,"ranking_epss":0.79305,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1493435","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1493435","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5858","summary":"Inappropriate implementation in WebApp Provider in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00707,"ranking_epss":0.72213,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1457704","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1457704","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5859","summary":"Incorrect security UI in Picture In Picture in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted local HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00668,"ranking_epss":0.71335,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1482045","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1482045","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5480","summary":"Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity: High)","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00226,"ranking_epss":0.45463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1492698","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1492698","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5482","summary":"Insufficient data validation in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13863,"ranking_epss":0.94318,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1492381","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html","https://crbug.com/1492381","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5546"],"published_time":"2023-11-01T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43796","summary":"Synapse is an open-source Matrix homeserver Prior to versions 1.95.1 and 1.96.0rc1, cached device information of remote users can be queried from Synapse. This can be used to enumerate the remote users known to a homeserver. System administrators are encouraged to upgrade to Synapse 1.95.1 or 1.96.0rc1 to receive a patch. As a workaround, the `federation_domain_whitelist` can be used to limit federation traffic with a homeserver.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00238,"ranking_epss":0.46959,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/matrix-org/synapse/commit/daec55e1fe120c564240c5386e77941372bf458f","https://github.com/matrix-org/synapse/security/advisories/GHSA-mp92-3jfm-3575","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IDEEZMFJBDLTFHQUTZRJJNCOZGQ2ZVS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VH3RNC5ZPQZ4OKPSL4E6BBJSZOQLGDEY/","https://security.gentoo.org/glsa/202401-12","https://github.com/matrix-org/synapse/commit/daec55e1fe120c564240c5386e77941372bf458f","https://github.com/matrix-org/synapse/security/advisories/GHSA-mp92-3jfm-3575","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IDEEZMFJBDLTFHQUTZRJJNCOZGQ2ZVS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VH3RNC5ZPQZ4OKPSL4E6BBJSZOQLGDEY/","https://security.gentoo.org/glsa/202401-12"],"published_time":"2023-10-31T17:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5349","summary":"A memory leak flaw was found in ruby-magick, an interface between Ruby and ImageMagick. This issue can lead to a denial of service (DOS) by memory exhaustion.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.0907,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-5349","https://bugzilla.redhat.com/show_bug.cgi?id=2247064","https://github.com/rmagick/rmagick/issues/1401","https://github.com/rmagick/rmagick/pull/1406","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3XMQ2KWPYGT447EKPENGXXHKAQ5NUWF/","https://access.redhat.com/security/cve/CVE-2023-5349","https://bugzilla.redhat.com/show_bug.cgi?id=2247064","https://github.com/rmagick/rmagick/issues/1401","https://github.com/rmagick/rmagick/pull/1406","https://lists.debian.org/debian-lts-announce/2023/10/msg00030.html","https://lists.debian.org/debian-lts-announce/2026/01/msg00003.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3XMQ2KWPYGT447EKPENGXXHKAQ5NUWF/"],"published_time":"2023-10-30T21:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34058","summary":"VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted  Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged  Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08422,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/10/27/1","https://lists.debian.org/debian-lts-announce/2023/11/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7G77Z76CQPGUF7VHRA6O3UFCMPPR4O2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQUOFQL2SNNNMKROQ3TZQY4HEYMNOIBW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLTKVTRKQW2GD2274H3UOW6XU4E62GSK/","https://www.debian.org/security/2023/dsa-5543","https://www.vmware.com/security/advisories/VMSA-2023-0024.html","http://www.openwall.com/lists/oss-security/2023/10/27/1","https://lists.debian.org/debian-lts-announce/2023/11/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7G77Z76CQPGUF7VHRA6O3UFCMPPR4O2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQUOFQL2SNNNMKROQ3TZQY4HEYMNOIBW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLTKVTRKQW2GD2274H3UOW6XU4E62GSK/","https://www.debian.org/security/2023/dsa-5543","https://www.vmware.com/security/advisories/VMSA-2023-0024.html"],"published_time":"2023-10-27T05:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5367","summary":"A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00064,"ranking_epss":0.19909,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6802","https://access.redhat.com/errata/RHSA-2023:6808","https://access.redhat.com/errata/RHSA-2023:7373","https://access.redhat.com/errata/RHSA-2023:7388","https://access.redhat.com/errata/RHSA-2023:7405","https://access.redhat.com/errata/RHSA-2023:7428","https://access.redhat.com/errata/RHSA-2023:7436","https://access.redhat.com/errata/RHSA-2023:7526","https://access.redhat.com/errata/RHSA-2023:7533","https://access.redhat.com/errata/RHSA-2024:0010","https://access.redhat.com/errata/RHSA-2024:0128","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2170","https://access.redhat.com/errata/RHSA-2024:2995","https://access.redhat.com/errata/RHSA-2024:2996","https://access.redhat.com/errata/RHSA-2025:12751","https://access.redhat.com/security/cve/CVE-2023-5367","https://bugzilla.redhat.com/show_bug.cgi?id=2243091","https://lists.x.org/archives/xorg-announce/2023-October/003430.html","https://access.redhat.com/errata/RHSA-2023:6802","https://access.redhat.com/errata/RHSA-2023:6808","https://access.redhat.com/errata/RHSA-2023:7373","https://access.redhat.com/errata/RHSA-2023:7388","https://access.redhat.com/errata/RHSA-2023:7405","https://access.redhat.com/errata/RHSA-2023:7428","https://access.redhat.com/errata/RHSA-2023:7436","https://access.redhat.com/errata/RHSA-2023:7526","https://access.redhat.com/errata/RHSA-2023:7533","https://access.redhat.com/errata/RHSA-2024:0010","https://access.redhat.com/errata/RHSA-2024:0128","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2170","https://access.redhat.com/errata/RHSA-2024:2995","https://access.redhat.com/errata/RHSA-2024:2996","https://access.redhat.com/security/cve/CVE-2023-5367","https://bugzilla.redhat.com/show_bug.cgi?id=2243091","https://lists.debian.org/debian-lts-announce/2023/10/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WS5E7H4A5J3U5YBCTMRPQVGWK5LVH7D/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RK66CXMXO3PCPDU3GDY5FK4UYHUXQJT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4YBK3I6SETHETBHDETFWM3VSZUQICIDV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKKIE626TZOOPD533EYN47J4RFNHZVOP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO2Q2NP6R62ZRQQG3XQ4AXUT7J2EKKKY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L2RMNR4235YXZZQ2X7Q4MTOZDMZ7BBQU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEDJN4VFN57K5POOC7BNVD6L6WUUCSG6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN6KV4XGQJRVAOSM5C3CWMVAXO53COIP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJXNI4BXURC2BKPNAHFJK3C5ZETB7PER/","https://lists.x.org/archives/xorg-announce/2023-October/003430.html","https://security.gentoo.org/glsa/202401-30","https://security.netapp.com/advisory/ntap-20231130-0004/","https://www.debian.org/security/2023/dsa-5534"],"published_time":"2023-10-25T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5380","summary":"A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00082,"ranking_epss":0.2396,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:7428","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2298","https://access.redhat.com/errata/RHSA-2024:2995","https://access.redhat.com/errata/RHSA-2024:3067","https://access.redhat.com/security/cve/CVE-2023-5380","https://bugzilla.redhat.com/show_bug.cgi?id=2244736","https://lists.x.org/archives/xorg-announce/2023-October/003430.html","https://access.redhat.com/errata/RHSA-2023:7428","https://access.redhat.com/errata/RHSA-2024:2169","https://access.redhat.com/errata/RHSA-2024:2298","https://access.redhat.com/errata/RHSA-2024:2995","https://access.redhat.com/errata/RHSA-2024:3067","https://access.redhat.com/security/cve/CVE-2023-5380","https://bugzilla.redhat.com/show_bug.cgi?id=2244736","https://lists.debian.org/debian-lts-announce/2023/10/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WS5E7H4A5J3U5YBCTMRPQVGWK5LVH7D/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RK66CXMXO3PCPDU3GDY5FK4UYHUXQJT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKKIE626TZOOPD533EYN47J4RFNHZVOP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO2Q2NP6R62ZRQQG3XQ4AXUT7J2EKKKY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN6KV4XGQJRVAOSM5C3CWMVAXO53COIP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJXNI4BXURC2BKPNAHFJK3C5ZETB7PER/","https://lists.x.org/archives/xorg-announce/2023-October/003430.html","https://security.gentoo.org/glsa/202401-30","https://security.netapp.com/advisory/ntap-20231130-0004/","https://www.debian.org/security/2023/dsa-5534"],"published_time":"2023-10-25T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41983","summary":"The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-of-service.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01108,"ranking_epss":0.78146,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Oct/19","http://seclists.org/fulldisclosure/2023/Oct/23","http://seclists.org/fulldisclosure/2023/Oct/24","http://seclists.org/fulldisclosure/2023/Oct/27","http://www.openwall.com/lists/oss-security/2023/11/15/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/","https://security.gentoo.org/glsa/202401-33","https://support.apple.com/en-us/HT213981","https://support.apple.com/en-us/HT213982","https://support.apple.com/en-us/HT213984","https://support.apple.com/en-us/HT213986","https://support.apple.com/kb/HT213984","https://www.debian.org/security/2023/dsa-5557","http://seclists.org/fulldisclosure/2023/Oct/19","http://seclists.org/fulldisclosure/2023/Oct/23","http://seclists.org/fulldisclosure/2023/Oct/24","http://seclists.org/fulldisclosure/2023/Oct/27","http://www.openwall.com/lists/oss-security/2023/11/15/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/","https://security.gentoo.org/glsa/202401-33","https://support.apple.com/en-us/HT213981","https://support.apple.com/en-us/HT213982","https://support.apple.com/en-us/HT213984","https://support.apple.com/en-us/HT213986","https://support.apple.com/kb/HT213984","https://www.debian.org/security/2023/dsa-5557"],"published_time":"2023-10-25T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-42852","summary":"A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02171,"ranking_epss":0.84344,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Oct/19","http://seclists.org/fulldisclosure/2023/Oct/22","http://seclists.org/fulldisclosure/2023/Oct/23","http://seclists.org/fulldisclosure/2023/Oct/24","http://seclists.org/fulldisclosure/2023/Oct/25","http://seclists.org/fulldisclosure/2023/Oct/27","http://www.openwall.com/lists/oss-security/2023/11/15/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/","https://security.gentoo.org/glsa/202401-33","https://support.apple.com/en-us/HT213981","https://support.apple.com/en-us/HT213982","https://support.apple.com/en-us/HT213984","https://support.apple.com/en-us/HT213986","https://support.apple.com/en-us/HT213987","https://support.apple.com/en-us/HT213988","https://support.apple.com/kb/HT213984","https://www.debian.org/security/2023/dsa-5557","http://seclists.org/fulldisclosure/2023/Oct/19","http://seclists.org/fulldisclosure/2023/Oct/22","http://seclists.org/fulldisclosure/2023/Oct/23","http://seclists.org/fulldisclosure/2023/Oct/24","http://seclists.org/fulldisclosure/2023/Oct/25","http://seclists.org/fulldisclosure/2023/Oct/27","http://www.openwall.com/lists/oss-security/2023/11/15/1","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/","https://security.gentoo.org/glsa/202401-33","https://support.apple.com/en-us/HT213981","https://support.apple.com/en-us/HT213982","https://support.apple.com/en-us/HT213984","https://support.apple.com/en-us/HT213986","https://support.apple.com/en-us/HT213987","https://support.apple.com/en-us/HT213988","https://support.apple.com/kb/HT213984","https://www.debian.org/security/2023/dsa-5557"],"published_time":"2023-10-25T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5472","summary":"Use after free in Profiles in Google Chrome prior to 118.0.5993.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0112,"ranking_epss":0.78267,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_24.html","https://crbug.com/1491296","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5TWIUD4VIISLZWEQ4WLWFZT34T3KOXZB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA6HMWNOYQ56R35MHW77GVW7373Z4RSN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDMQG42VVOZ5USSI4NSNT3VJPGBPNSIW/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5536","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_24.html","https://crbug.com/1491296","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5TWIUD4VIISLZWEQ4WLWFZT34T3KOXZB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA6HMWNOYQ56R35MHW77GVW7373Z4RSN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDMQG42VVOZ5USSI4NSNT3VJPGBPNSIW/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5536"],"published_time":"2023-10-25T18:17:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-31122","summary":"Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0043,"ranking_epss":0.62606,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/","https://security.netapp.com/advisory/ntap-20231027-0011/","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/","https://security.netapp.com/advisory/ntap-20231027-0011/"],"published_time":"2023-10-23T07:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-45802","summary":"When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.\n\nThis was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During \"normal\" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.\n\nUsers are recommended to upgrade to version 2.4.58, which fixes the issue.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.01741,"ranking_epss":0.82548,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://httpd.apache.org/security/vulnerabilities_24.html","https://httpd.apache.org/security/vulnerabilities_24.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/","https://security.netapp.com/advisory/ntap-20231027-0011/"],"published_time":"2023-10-23T07:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5686","summary":"Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0.","cvss":5.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.1,"cvss_v4":null,"epss":0.00084,"ranking_epss":0.24512,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/radareorg/radare2/commit/1bdda93e348c160c84e30da3637acef26d0348de","https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/64KUV6OGEVQ75QOV35PUVVDOJTKSJHYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOZ6XCADVAPAIHMVSV3FUAN742BHXF55/","https://github.com/radareorg/radare2/commit/1bdda93e348c160c84e30da3637acef26d0348de","https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/64KUV6OGEVQ75QOV35PUVVDOJTKSJHYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOZ6XCADVAPAIHMVSV3FUAN742BHXF55/"],"published_time":"2023-10-20T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-45145","summary":"Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.","cvss":3.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.6,"cvss_v4":null,"epss":0.00582,"ranking_epss":0.68986,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/redis/redis/commit/03345ddc7faf7af079485f2cbe5d17a1611cbce1","https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx","https://lists.debian.org/debian-lts-announce/2023/10/msg00032.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/464JPNBWE433ZGYXO3KN72VR3KJPWHAW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNEK2K4IE7MPKRD6H36JXZMJKYS6I5GQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZMGTTV5XM4LA66FSIJSETNBBRRPJYOQ/","https://security.netapp.com/advisory/ntap-20231116-0014/","https://github.com/redis/redis/commit/03345ddc7faf7af079485f2cbe5d17a1611cbce1","https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx","https://lists.debian.org/debian-lts-announce/2023/10/msg00032.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/464JPNBWE433ZGYXO3KN72VR3KJPWHAW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNEK2K4IE7MPKRD6H36JXZMJKYS6I5GQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZMGTTV5XM4LA66FSIJSETNBBRRPJYOQ/","https://security.netapp.com/advisory/ntap-20231116-0014/"],"published_time":"2023-10-18T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5631","summary":"Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker\n\nto load arbitrary JavaScript code.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.83433,"ranking_epss":0.99281,"kev":true,"propose_action":"Roundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that allows a remote attacker to run malicious JavaScript code.","ransomware_campaign":"Unknown","references":["http://www.openwall.com/lists/oss-security/2023/11/01/1","http://www.openwall.com/lists/oss-security/2023/11/01/3","http://www.openwall.com/lists/oss-security/2023/11/17/2","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079","https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d","https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf75552e5376613","https://github.com/roundcube/roundcubemail/issues/9168","https://github.com/roundcube/roundcubemail/releases/tag/1.4.15","https://github.com/roundcube/roundcubemail/releases/tag/1.5.5","https://github.com/roundcube/roundcubemail/releases/tag/1.6.4","https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LK67Q46OIEGJCRQUBHKLH3IIJTBNGGX4/","https://roundcube.net/news/2023/10/16/security-update-1.6.4-released","https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15","https://www.debian.org/security/2023/dsa-5531","http://www.openwall.com/lists/oss-security/2023/11/01/1","http://www.openwall.com/lists/oss-security/2023/11/01/3","http://www.openwall.com/lists/oss-security/2023/11/17/2","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079","https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d","https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf75552e5376613","https://github.com/roundcube/roundcubemail/issues/9168","https://github.com/roundcube/roundcubemail/releases/tag/1.4.15","https://github.com/roundcube/roundcubemail/releases/tag/1.5.5","https://github.com/roundcube/roundcubemail/releases/tag/1.6.4","https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LK67Q46OIEGJCRQUBHKLH3IIJTBNGGX4/","https://roundcube.net/news/2023/10/16/security-update-1.6.4-released","https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15","https://www.debian.org/security/2023/dsa-5531","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-5631"],"published_time":"2023-10-18T15:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38545","summary":"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \"let the host resolve the name\" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.2625,"ranking_epss":0.96316,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2024/Jan/34","http://seclists.org/fulldisclosure/2024/Jan/37","http://seclists.org/fulldisclosure/2024/Jan/38","https://curl.se/docs/CVE-2023-38545.html","https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/","https://security.netapp.com/advisory/ntap-20231027-0009/","https://security.netapp.com/advisory/ntap-20240201-0005/","https://support.apple.com/kb/HT214036","https://support.apple.com/kb/HT214057","https://support.apple.com/kb/HT214058","https://support.apple.com/kb/HT214063","https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/","http://seclists.org/fulldisclosure/2024/Jan/34","http://seclists.org/fulldisclosure/2024/Jan/37","http://seclists.org/fulldisclosure/2024/Jan/38","https://curl.se/docs/CVE-2023-38545.html","https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/","https://security.netapp.com/advisory/ntap-20231027-0009/","https://security.netapp.com/advisory/ntap-20240201-0005/","https://support.apple.com/kb/HT214036","https://support.apple.com/kb/HT214057","https://support.apple.com/kb/HT214058","https://support.apple.com/kb/HT214063","https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/","https://github.com/UTsweetyfish/CVE-2023-38545","https://github.com/bcdannyboy/CVE-2023-38545","https://github.com/dbrugman/CVE-2023-38545-POC"],"published_time":"2023-10-18T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38552","summary":"When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check.\nImpacts:\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x.\nPlease note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00397,"ranking_epss":0.60507,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/2094235","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","https://security.netapp.com/advisory/ntap-20231116-0013/","https://hackerone.com/reports/2094235","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","https://security.netapp.com/advisory/ntap-20231116-0013/","https://security.netapp.com/advisory/ntap-20241108-0002/"],"published_time":"2023-10-18T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39332","summary":"Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects.\r\n\r\nThis is distinct from CVE-2023-32004 which only referred to `Buffer` objects. However, the vulnerability follows the same pattern using `Uint8Array` instead of `Buffer`.\r\n\r\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0057,"ranking_epss":0.68655,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/2199818","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://security.netapp.com/advisory/ntap-20231116-0009/","https://hackerone.com/reports/2199818","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://security.netapp.com/advisory/ntap-20231116-0009/","https://security.netapp.com/advisory/ntap-20241108-0002/"],"published_time":"2023-10-18T04:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22084","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 5.7.43 and prior, 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.01362,"ranking_epss":0.80198,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2024/01/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OR7GNQAJZ7NMHT4HRDNROR3DS272KKET/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UCGSAQFWYIJRIYLZLHPS3MRUS4AQ5JQH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZL2AT2ZUKB6K22UTISHEZ4JKG4VZ3VO/","https://security.netapp.com/advisory/ntap-20231027-0009/","https://www.oracle.com/security-alerts/cpuoct2023.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OR7GNQAJZ7NMHT4HRDNROR3DS272KKET/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UCGSAQFWYIJRIYLZLHPS3MRUS4AQ5JQH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZL2AT2ZUKB6K22UTISHEZ4JKG4VZ3VO/","https://security.netapp.com/advisory/ntap-20231027-0009/","https://www.oracle.com/security-alerts/cpuoct2023.html"],"published_time":"2023-10-17T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-45803","summary":"urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.","cvss":4.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15757,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9","https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/","https://www.rfc-editor.org/rfc/rfc9110.html#name-get","https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9","https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4","https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/","https://www.rfc-editor.org/rfc/rfc9110.html#name-get"],"published_time":"2023-10-17T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39456","summary":"Improper Input Validation vulnerability in Apache Traffic Server with malformed HTTP/2 frames.This issue affects Apache Traffic Server: from 9.0.0 through 9.2.2.\n\nUsers are recommended to upgrade to version 9.2.3, which fixes the issue.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.07335,"ranking_epss":0.91714,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/","https://www.debian.org/security/2023/dsa-5549","https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/","https://www.debian.org/security/2023/dsa-5549"],"published_time":"2023-10-17T07:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41752","summary":"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2.\n\nUsers are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00347,"ranking_epss":0.57321,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q","https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/","https://www.debian.org/security/2023/dsa-5549","https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q","https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/","https://www.debian.org/security/2023/dsa-5549"],"published_time":"2023-10-17T07:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39999","summary":"Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00895,"ranking_epss":0.75639,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/","https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve","https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve","https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/","https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve","https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve"],"published_time":"2023-10-13T12:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-45143","summary":"Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.","cvss":3.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.9,"cvss_v4":null,"epss":0.00105,"ranking_epss":0.28597,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76","https://github.com/nodejs/undici/releases/tag/v5.26.2","https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp","https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g","https://hackerone.com/reports/2166948","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76","https://github.com/nodejs/undici/releases/tag/v5.26.2","https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp","https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g","https://hackerone.com/reports/2166948","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/"],"published_time":"2023-10-12T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43789","summary":"A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.1037,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2146","https://access.redhat.com/errata/RHSA-2024:2217","https://access.redhat.com/errata/RHSA-2024:2974","https://access.redhat.com/errata/RHSA-2024:3022","https://access.redhat.com/security/cve/CVE-2023-43789","https://bugzilla.redhat.com/show_bug.cgi?id=2242249","https://access.redhat.com/errata/RHSA-2024:2146","https://access.redhat.com/errata/RHSA-2024:2217","https://access.redhat.com/errata/RHSA-2024:2974","https://access.redhat.com/errata/RHSA-2024:3022","https://access.redhat.com/security/cve/CVE-2023-43789","https://bugzilla.redhat.com/show_bug.cgi?id=2242249","https://lists.debian.org/debian-lts-announce/2023/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63IBRFLQVZSMOAZBZOBKFWJP26ILRAGQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3KFUQT42R7TB4D7RISNSBQFJGLTQGUL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFAJTBNO3PAIA6EGZR4PN62H6RLKNDTE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZECBCLDYUGLDSVV75ECPIBW7JXOB3747/"],"published_time":"2023-10-12T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5487","summary":"Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09806,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html","https://crbug.com/1062251","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5526","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html","https://crbug.com/1062251","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5526"],"published_time":"2023-10-11T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5218","summary":"Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00257,"ranking_epss":0.49116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html","https://crbug.com/1487110","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5526","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html","https://crbug.com/1487110","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5526"],"published_time":"2023-10-11T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5475","summary":"Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13325,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html","https://crbug.com/1476952","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5526","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html","https://crbug.com/1476952","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5526"],"published_time":"2023-10-11T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5484","summary":"Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00156,"ranking_epss":0.3637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html","https://crbug.com/1414936","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5526","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html","https://crbug.com/1414936","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5526"],"published_time":"2023-10-11T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39325","summary":"A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0015,"ranking_epss":0.3553,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://go.dev/cl/534215","https://go.dev/cl/534235","https://go.dev/issue/63417","https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OVW5V2DM5K5IC3H7O42YDUGNJ74J35O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SZN67IL7HMGMNAVLOTIXLIHUDXZK4LH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WJ4QVX2AMUJ2F2S27POOAHRC4K3CHU4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVZDNSMVDAQJ64LJC5I5U5LDM5753647/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2BBIDR2ZMB3X5BC7SR4SLQMHRMVPY6L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRC75BQJP6FJN2L7KCKYZW4DSBD7QSD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTMJ3NJIDAZFWJQQSP3L22MUFJ3UP2PT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSY7SXFFTPZFWDM6XELSDSHZLVW3AHK7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZQIELEIRSZUYTFFH5KTH2YJ4IIQG2KE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPWCNYB5PQ5PCVZ4NJT6G56ZYFZ5QBU6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5E5JSJBZLYXOTZWXHJKRVCIXIHVWKJ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZQYOOKHQDQ57LV2IAG6NRFOVXKHJJ3Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NG7IMPL55MVWU3LCI4JQJT3K2U5CHDV7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ODBY7RVMGZCBSTWF2OZGIZS57FNFUL67/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXGWPQOJ3JNDW2XIYKIVJ7N7QUIFNM2Q/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJCUNGIQDUMZ4Z6HWVYIMR66A35F5S74/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QF5QSYAOPDOWLY6DUHID56Q4HQFYB45I/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXOU2JZUBEBP7GBKAYIJRPRBZSJCD7ST/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTT7DG3QOF5ZNJLUGHDNLRUIN6OWZARP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LZSWTV4NV4SNQARNXG5T6LRHP26EW2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WCNCBYKZXLDFGAJUB7ZP5VLC3YTHJNVH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XTNLSL44Y5FB6JWADSZH6DCV4JJAAEQY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJWHBLVZDM5KQSDFRBFRKU5KSSOLIRQ4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRKEXKANQ7BKJW2YTAMP625LJUJZLJ4P/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/","https://pkg.go.dev/vuln/GO-2023-2102","https://security.gentoo.org/glsa/202311-09","https://security.netapp.com/advisory/ntap-20231110-0008/","https://go.dev/cl/534215","https://go.dev/cl/534235","https://go.dev/issue/63417","https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OVW5V2DM5K5IC3H7O42YDUGNJ74J35O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SZN67IL7HMGMNAVLOTIXLIHUDXZK4LH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WJ4QVX2AMUJ2F2S27POOAHRC4K3CHU4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVZDNSMVDAQJ64LJC5I5U5LDM5753647/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2BBIDR2ZMB3X5BC7SR4SLQMHRMVPY6L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRC75BQJP6FJN2L7KCKYZW4DSBD7QSD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTMJ3NJIDAZFWJQQSP3L22MUFJ3UP2PT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSY7SXFFTPZFWDM6XELSDSHZLVW3AHK7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZQIELEIRSZUYTFFH5KTH2YJ4IIQG2KE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPWCNYB5PQ5PCVZ4NJT6G56ZYFZ5QBU6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5E5JSJBZLYXOTZWXHJKRVCIXIHVWKJ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZQYOOKHQDQ57LV2IAG6NRFOVXKHJJ3Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NG7IMPL55MVWU3LCI4JQJT3K2U5CHDV7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ODBY7RVMGZCBSTWF2OZGIZS57FNFUL67/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXGWPQOJ3JNDW2XIYKIVJ7N7QUIFNM2Q/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJCUNGIQDUMZ4Z6HWVYIMR66A35F5S74/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QF5QSYAOPDOWLY6DUHID56Q4HQFYB45I/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXOU2JZUBEBP7GBKAYIJRPRBZSJCD7ST/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTT7DG3QOF5ZNJLUGHDNLRUIN6OWZARP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LZSWTV4NV4SNQARNXG5T6LRHP26EW2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WCNCBYKZXLDFGAJUB7ZP5VLC3YTHJNVH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XTNLSL44Y5FB6JWADSZH6DCV4JJAAEQY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJWHBLVZDM5KQSDFRBFRKU5KSSOLIRQ4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRKEXKANQ7BKJW2YTAMP625LJUJZLJ4P/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/","https://pkg.go.dev/vuln/GO-2023-2102","https://security.gentoo.org/glsa/202311-09","https://security.netapp.com/advisory/ntap-20231110-0008/"],"published_time":"2023-10-11T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5535","summary":"Use After Free in GitHub repository vim/vim prior to v9.0.2010.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08036,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d","https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/","https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d","https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/"],"published_time":"2023-10-11T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-37536","summary":"An integer overflow in xerces-c++ 3.2.3 in BigFix Platform allows remote attackers to cause out-of-bound access via HTTP request.","cvss":8.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.2,"cvss_v4":null,"epss":0.01084,"ranking_epss":0.77907,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A6WWL4SWKAVYK6VK5YN7KZP4MZWC7IY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAOSSJ72CUJ535VRWTCVQKUYT2LYR3OM/","https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107791","https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A6WWL4SWKAVYK6VK5YN7KZP4MZWC7IY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAOSSJ72CUJ535VRWTCVQKUYT2LYR3OM/","https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107791"],"published_time":"2023-10-11T07:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-45129","summary":"Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. Prior to version 1.94.0, a malicious server ACL event can impact performance temporarily or permanently leading to a persistent denial of service. Homeservers running on a closed federation (which presumably do not need to use server ACLs) are not affected. Server administrators are advised to upgrade to Synapse 1.94.0 or later. As a workaround, rooms with malicious server ACL events can be purged and blocked using the admin API.","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00243,"ranking_epss":0.47568,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/matrix-org/synapse/pull/16360","https://github.com/matrix-org/synapse/security/advisories/GHSA-5chr-wjw5-3gq4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEVRB4MG5UXQ5RLZHSUJXM5GWEBYYS5B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WRO4MPQ6HOXIUZM6RJP6VTCTMV7RD2T3/","https://matrix-org.github.io/synapse/latest/admin_api/rooms.html#version-2-new-version","https://security.gentoo.org/glsa/202401-12","https://github.com/matrix-org/synapse/pull/16360","https://github.com/matrix-org/synapse/security/advisories/GHSA-5chr-wjw5-3gq4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEVRB4MG5UXQ5RLZHSUJXM5GWEBYYS5B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WRO4MPQ6HOXIUZM6RJP6VTCTMV7RD2T3/","https://matrix-org.github.io/synapse/latest/admin_api/rooms.html#version-2-new-version","https://security.gentoo.org/glsa/202401-12"],"published_time":"2023-10-10T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-44487","summary":"The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.94395,"ranking_epss":0.99974,"kev":true,"propose_action":"HTTP/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS).","ransomware_campaign":"Unknown","references":["http://www.openwall.com/lists/oss-security/2023/10/10/6","http://www.openwall.com/lists/oss-security/2023/10/10/7","http://www.openwall.com/lists/oss-security/2023/10/13/4","http://www.openwall.com/lists/oss-security/2023/10/13/9","http://www.openwall.com/lists/oss-security/2023/10/18/4","http://www.openwall.com/lists/oss-security/2023/10/18/8","http://www.openwall.com/lists/oss-security/2023/10/19/6","http://www.openwall.com/lists/oss-security/2023/10/20/8","https://access.redhat.com/security/cve/cve-2023-44487","https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/","https://aws.amazon.com/security/security-bulletins/AWS-2023-011/","https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/","https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/","https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/","https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack","https://blog.vespa.ai/cve-2023-44487/","https://bugzilla.proxmox.com/show_bug.cgi?id=4988","https://bugzilla.redhat.com/show_bug.cgi?id=2242803","https://bugzilla.suse.com/show_bug.cgi?id=1216123","https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9","https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/","https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack","https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125","https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715","https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve","https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764","https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088","https://github.com/Azure/AKS/issues/3947","https://github.com/Kong/kong/discussions/11741","https://github.com/advisories/GHSA-qppj-fm5r-hxr3","https://github.com/advisories/GHSA-vx74-f528-fxqg","https://github.com/advisories/GHSA-xpw8-rcwv-8f8p","https://github.com/akka/akka-http/issues/4323","https://github.com/alibaba/tengine/issues/1872","https://github.com/apache/apisix/issues/10320","https://github.com/apache/httpd-site/pull/10","https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113","https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2","https://github.com/apache/trafficserver/pull/10564","https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487","https://github.com/bcdannyboy/CVE-2023-44487","https://github.com/caddyserver/caddy/issues/5877","https://github.com/caddyserver/caddy/releases/tag/v2.7.5","https://github.com/dotnet/announcements/issues/277","https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73","https://github.com/eclipse/jetty.project/issues/10679","https://github.com/envoyproxy/envoy/pull/30055","https://github.com/etcd-io/etcd/issues/16740","https://github.com/facebook/proxygen/pull/466","https://github.com/golang/go/issues/63417","https://github.com/grpc/grpc-go/pull/6703","https://github.com/grpc/grpc/releases/tag/v1.59.2","https://github.com/h2o/h2o/pull/3291","https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf","https://github.com/haproxy/haproxy/issues/2312","https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244","https://github.com/junkurihara/rust-rpxy/issues/97","https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1","https://github.com/kazu-yamamoto/http2/issues/93","https://github.com/kubernetes/kubernetes/pull/121120","https://github.com/line/armeria/pull/5232","https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632","https://github.com/micrictor/http2-rst-stream","https://github.com/microsoft/CBL-Mariner/pull/6381","https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61","https://github.com/nghttp2/nghttp2/pull/1961","https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0","https://github.com/ninenines/cowboy/issues/1615","https://github.com/nodejs/node/pull/50121","https://github.com/openresty/openresty/issues/930","https://github.com/opensearch-project/data-prepper/issues/3474","https://github.com/oqtane/oqtane.framework/discussions/3367","https://github.com/projectcontour/contour/pull/5826","https://github.com/tempesta-tech/tempesta/issues/1986","https://github.com/varnishcache/varnish-cache/issues/3996","https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo","https://istio.io/latest/news/security/istio-security-2023-004/","https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/","https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q","https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html","https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html","https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/","https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html","https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html","https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html","https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487","https://my.f5.com/manage/s/article/K000137106","https://netty.io/news/2023/10/10/4-1-100-Final.html","https://news.ycombinator.com/item?id=37830987","https://news.ycombinator.com/item?id=37830998","https://news.ycombinator.com/item?id=37831062","https://news.ycombinator.com/item?id=37837043","https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/","https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected","https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ","https://security.gentoo.org/glsa/202311-09","https://security.netapp.com/advisory/ntap-20231016-0001/","https://security.netapp.com/advisory/ntap-20240426-0007/","https://security.netapp.com/advisory/ntap-20240621-0006/","https://security.netapp.com/advisory/ntap-20240621-0007/","https://security.paloaltonetworks.com/CVE-2023-44487","https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14","https://ubuntu.com/security/CVE-2023-44487","https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/","https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487","https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event","https://www.debian.org/security/2023/dsa-5521","https://www.debian.org/security/2023/dsa-5522","https://www.debian.org/security/2023/dsa-5540","https://www.debian.org/security/2023/dsa-5549","https://www.debian.org/security/2023/dsa-5558","https://www.debian.org/security/2023/dsa-5570","https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487","https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/","https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/","https://www.openwall.com/lists/oss-security/2023/10/10/6","https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack","https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/","http://www.openwall.com/lists/oss-security/2023/10/13/4","http://www.openwall.com/lists/oss-security/2023/10/13/9","http://www.openwall.com/lists/oss-security/2023/10/18/4","http://www.openwall.com/lists/oss-security/2023/10/18/8","http://www.openwall.com/lists/oss-security/2023/10/19/6","http://www.openwall.com/lists/oss-security/2023/10/20/8","http://www.openwall.com/lists/oss-security/2025/08/13/6","https://access.redhat.com/security/cve/cve-2023-44487","https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/","https://aws.amazon.com/security/security-bulletins/AWS-2023-011/","https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/","https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/","https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/","https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack","https://blog.vespa.ai/cve-2023-44487/","https://bugzilla.proxmox.com/show_bug.cgi?id=4988","https://bugzilla.redhat.com/show_bug.cgi?id=2242803","https://bugzilla.suse.com/show_bug.cgi?id=1216123","https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9","https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/","https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack","https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125","https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715","https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve","https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764","https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088","https://github.com/Azure/AKS/issues/3947","https://github.com/Kong/kong/discussions/11741","https://github.com/advisories/GHSA-qppj-fm5r-hxr3","https://github.com/advisories/GHSA-vx74-f528-fxqg","https://github.com/advisories/GHSA-xpw8-rcwv-8f8p","https://github.com/akka/akka-http/issues/4323","https://github.com/alibaba/tengine/issues/1872","https://github.com/apache/apisix/issues/10320","https://github.com/apache/httpd-site/pull/10","https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113","https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2","https://github.com/apache/trafficserver/pull/10564","https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487","https://github.com/bcdannyboy/CVE-2023-44487","https://github.com/caddyserver/caddy/issues/5877","https://github.com/caddyserver/caddy/releases/tag/v2.7.5","https://github.com/dotnet/announcements/issues/277","https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73","https://github.com/eclipse/jetty.project/issues/10679","https://github.com/envoyproxy/envoy/pull/30055","https://github.com/etcd-io/etcd/issues/16740","https://github.com/facebook/proxygen/pull/466","https://github.com/golang/go/issues/63417","https://github.com/grpc/grpc-go/pull/6703","https://github.com/h2o/h2o/pull/3291","https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf","https://github.com/haproxy/haproxy/issues/2312","https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244","https://github.com/junkurihara/rust-rpxy/issues/97","https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1","https://github.com/kazu-yamamoto/http2/issues/93","https://github.com/kubernetes/kubernetes/pull/121120","https://github.com/line/armeria/pull/5232","https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632","https://github.com/micrictor/http2-rst-stream","https://github.com/microsoft/CBL-Mariner/pull/6381","https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61","https://github.com/nghttp2/nghttp2/pull/1961","https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0","https://github.com/ninenines/cowboy/issues/1615","https://github.com/nodejs/node/pull/50121","https://github.com/openresty/openresty/issues/930","https://github.com/opensearch-project/data-prepper/issues/3474","https://github.com/oqtane/oqtane.framework/discussions/3367","https://github.com/projectcontour/contour/pull/5826","https://github.com/tempesta-tech/tempesta/issues/1986","https://github.com/varnishcache/varnish-cache/issues/3996","https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo","https://istio.io/latest/news/security/istio-security-2023-004/","https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/","https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q","https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html","https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html","https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/","https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html","https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html","https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html","https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487","https://my.f5.com/manage/s/article/K000137106","https://netty.io/news/2023/10/10/4-1-100-Final.html","https://news.ycombinator.com/item?id=37830987","https://news.ycombinator.com/item?id=37830998","https://news.ycombinator.com/item?id=37831062","https://news.ycombinator.com/item?id=37837043","https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/","https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected","https://security.gentoo.org/glsa/202311-09","https://security.netapp.com/advisory/ntap-20231016-0001/","https://security.netapp.com/advisory/ntap-20240426-0007/","https://security.netapp.com/advisory/ntap-20240621-0006/","https://security.netapp.com/advisory/ntap-20240621-0007/","https://security.paloaltonetworks.com/CVE-2023-44487","https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14","https://ubuntu.com/security/CVE-2023-44487","https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/","https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487","https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event","https://www.debian.org/security/2023/dsa-5521","https://www.debian.org/security/2023/dsa-5522","https://www.debian.org/security/2023/dsa-5540","https://www.debian.org/security/2023/dsa-5549","https://www.debian.org/security/2023/dsa-5558","https://www.debian.org/security/2023/dsa-5570","https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487","https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/","https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/","https://www.openwall.com/lists/oss-security/2023/10/10/6","https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack","https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/","https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487"],"published_time":"2023-10-10T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43786","summary":"A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00084,"ranking_epss":0.24406,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2145","https://access.redhat.com/errata/RHSA-2024:2973","https://access.redhat.com/security/cve/CVE-2023-43786","https://bugzilla.redhat.com/show_bug.cgi?id=2242253","http://www.openwall.com/lists/oss-security/2024/01/24/9","https://access.redhat.com/errata/RHSA-2024:2145","https://access.redhat.com/errata/RHSA-2024:2973","https://access.redhat.com/security/cve/CVE-2023-43786","https://bugzilla.redhat.com/show_bug.cgi?id=2242253","https://lists.debian.org/debian-lts-announce/2023/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63IBRFLQVZSMOAZBZOBKFWJP26ILRAGQ/","https://security.netapp.com/advisory/ntap-20231103-0006/"],"published_time":"2023-10-10T13:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43787","summary":"A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12586,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2145","https://access.redhat.com/errata/RHSA-2024:2973","https://access.redhat.com/security/cve/CVE-2023-43787","https://bugzilla.redhat.com/show_bug.cgi?id=2242254","http://www.openwall.com/lists/oss-security/2024/01/24/9","https://access.redhat.com/errata/RHSA-2024:2145","https://access.redhat.com/errata/RHSA-2024:2973","https://access.redhat.com/security/cve/CVE-2023-43787","https://bugzilla.redhat.com/show_bug.cgi?id=2242254","https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-two/","https://lists.debian.org/debian-lts-announce/2023/10/msg00005.html","https://security.netapp.com/advisory/ntap-20231103-0006/"],"published_time":"2023-10-10T13:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43788","summary":"A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06045,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2146","https://access.redhat.com/errata/RHSA-2024:2217","https://access.redhat.com/errata/RHSA-2024:2974","https://access.redhat.com/errata/RHSA-2024:3022","https://access.redhat.com/security/cve/CVE-2023-43788","https://bugzilla.redhat.com/show_bug.cgi?id=2242248","https://access.redhat.com/errata/RHSA-2024:2146","https://access.redhat.com/errata/RHSA-2024:2217","https://access.redhat.com/errata/RHSA-2024:2974","https://access.redhat.com/errata/RHSA-2024:3022","https://access.redhat.com/security/cve/CVE-2023-43788","https://bugzilla.redhat.com/show_bug.cgi?id=2242248","https://lists.debian.org/debian-lts-announce/2023/10/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63IBRFLQVZSMOAZBZOBKFWJP26ILRAGQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3KFUQT42R7TB4D7RISNSBQFJGLTQGUL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFAJTBNO3PAIA6EGZR4PN62H6RLKNDTE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6FARGWN7VWXXWPXYNEEDJLRR3EWFZ3T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZECBCLDYUGLDSVV75ECPIBW7JXOB3747/"],"published_time":"2023-10-10T13:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43785","summary":"A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.001,"ranking_epss":0.276,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2145","https://access.redhat.com/errata/RHSA-2024:2973","https://access.redhat.com/security/cve/CVE-2023-43785","https://bugzilla.redhat.com/show_bug.cgi?id=2242252","https://access.redhat.com/errata/RHSA-2024:2145","https://access.redhat.com/errata/RHSA-2024:2973","https://access.redhat.com/security/cve/CVE-2023-43785","https://bugzilla.redhat.com/show_bug.cgi?id=2242252","https://lists.debian.org/debian-lts-announce/2023/10/msg00004.html","https://security.netapp.com/advisory/ntap-20231103-0006/"],"published_time":"2023-10-10T13:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43641","summary":"libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.80194,"ranking_epss":0.99116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/176128/libcue-2.2.1-Out-Of-Bounds-Access.html","https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/","https://github.com/lipnitsk/libcue/commit/cfb98a060fd79dbc3463d85f0f29c3c335dfa0ea","https://github.com/lipnitsk/libcue/commit/fdf72c8bded8d24cfa0608b8e97f2eed210a920e","https://github.com/lipnitsk/libcue/security/advisories/GHSA-5982-x7hv-r9cj","https://lists.debian.org/debian-lts-announce/2023/10/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57JEYTRFG4PVGZZ7HIEFTX5I7OONFFMI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQOMFDBXGM3DOICCXKCUS76OTKTSPMN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XUS4HTNGGGUIFLYSKTODCRIOXLX5HGV3/","https://www.debian.org/security/2023/dsa-5524","http://packetstormsecurity.com/files/176128/libcue-2.2.1-Out-Of-Bounds-Access.html","https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/","https://github.com/lipnitsk/libcue/commit/cfb98a060fd79dbc3463d85f0f29c3c335dfa0ea","https://github.com/lipnitsk/libcue/commit/fdf72c8bded8d24cfa0608b8e97f2eed210a920e","https://github.com/lipnitsk/libcue/security/advisories/GHSA-5982-x7hv-r9cj","https://lists.debian.org/debian-lts-announce/2023/10/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57JEYTRFG4PVGZZ7HIEFTX5I7OONFFMI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQOMFDBXGM3DOICCXKCUS76OTKTSPMN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XUS4HTNGGGUIFLYSKTODCRIOXLX5HGV3/","https://www.debian.org/security/2023/dsa-5524"],"published_time":"2023-10-09T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39189","summary":"A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.","cvss":5.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.1,"cvss_v4":null,"epss":9e-05,"ranking_epss":0.00807,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-39189","https://bugzilla.redhat.com/show_bug.cgi?id=2226777","https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-39189","https://bugzilla.redhat.com/show_bug.cgi?id=2226777","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"],"published_time":"2023-10-09T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39192","summary":"A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":9e-05,"ranking_epss":0.0082,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-39192","https://bugzilla.redhat.com/show_bug.cgi?id=2226784","https://www.zerodayinitiative.com/advisories/ZDI-CAN-18408/","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-39192","https://bugzilla.redhat.com/show_bug.cgi?id=2226784","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","https://www.zerodayinitiative.com/advisories/ZDI-CAN-18408/"],"published_time":"2023-10-09T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39193","summary":"A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":8e-05,"ranking_epss":0.0067,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-39193","https://bugzilla.redhat.com/show_bug.cgi?id=2226787","https://www.zerodayinitiative.com/advisories/ZDI-CAN-18866/","https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-39193","https://bugzilla.redhat.com/show_bug.cgi?id=2226787","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","https://www.zerodayinitiative.com/advisories/ZDI-CAN-18866/"],"published_time":"2023-10-09T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39194","summary":"A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.","cvss":3.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.2,"cvss_v4":null,"epss":9e-05,"ranking_epss":0.00819,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-39194","https://bugzilla.redhat.com/show_bug.cgi?id=2226788","https://www.zerodayinitiative.com/advisories/ZDI-CAN-18111/","https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-39194","https://bugzilla.redhat.com/show_bug.cgi?id=2226788","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","https://www.zerodayinitiative.com/advisories/ZDI-CAN-18111/"],"published_time":"2023-10-09T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43615","summary":"Mbed TLS 2.x before 2.28.5 and 3.x before 3.5.0 has a Buffer Overflow.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00309,"ranking_epss":0.54142,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDSHAANRULB57GVS5B3DZHXL5KCC7OWQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGRB5MO2KUJKYPMGXMIZH2WRH6QR5UZS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7SB7L6A56QZALDTOZ6O4X7PTC4I647R/","https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDSHAANRULB57GVS5B3DZHXL5KCC7OWQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGRB5MO2KUJKYPMGXMIZH2WRH6QR5UZS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7SB7L6A56QZALDTOZ6O4X7PTC4I647R/","https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/"],"published_time":"2023-10-07T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-45239","summary":"A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.28689,"ranking_epss":0.96553,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/facebook/tac_plus/pull/41","https://github.com/facebook/tac_plus/security/advisories/GHSA-p334-5r3g-4vx3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4J7ZYMFZB4G4OU5EDJPQLP6F6RKDGIH/","https://github.com/facebook/tac_plus/pull/41","https://github.com/facebook/tac_plus/security/advisories/GHSA-p334-5r3g-4vx3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4J7ZYMFZB4G4OU5EDJPQLP6F6RKDGIH/"],"published_time":"2023-10-06T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39928","summary":"A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a malicious webpage to trigger this vulnerability.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00175,"ranking_epss":0.38945,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/","https://security.gentoo.org/glsa/202401-33","https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831","https://webkitgtk.org/security/WSA-2023-0009.html","https://www.debian.org/security/2023/dsa-5527","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/","https://security.gentoo.org/glsa/202401-33","https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831","https://webkitgtk.org/security/WSA-2023-0009.html","https://www.debian.org/security/2023/dsa-5527","https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1831"],"published_time":"2023-10-06T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39323","summary":"Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.0006,"ranking_epss":0.18723,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://go.dev/cl/533215","https://go.dev/issue/63211","https://groups.google.com/g/golang-announce/c/XBa1oHDevAo","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/","https://pkg.go.dev/vuln/GO-2023-2095","https://security.gentoo.org/glsa/202311-09","https://security.netapp.com/advisory/ntap-20231020-0001/","https://go.dev/cl/533215","https://go.dev/issue/63211","https://groups.google.com/g/golang-announce/c/XBa1oHDevAo","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/","https://pkg.go.dev/vuln/GO-2023-2095","https://security.gentoo.org/glsa/202311-09","https://security.netapp.com/advisory/ntap-20231020-0001/"],"published_time":"2023-10-05T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5441","summary":"NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08465,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/vim/vim/commit/20d161ace307e28690229b68584f2d84556f8960","https://huntr.dev/bounties/b54cbdf5-3e85-458d-bb38-9ea2c0b669f2","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/","https://github.com/vim/vim/commit/20d161ace307e28690229b68584f2d84556f8960","https://huntr.dev/bounties/b54cbdf5-3e85-458d-bb38-9ea2c0b669f2","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/"],"published_time":"2023-10-05T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40745","summary":"LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00281,"ranking_epss":0.51503,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2289","https://access.redhat.com/security/cve/CVE-2023-40745","https://bugzilla.redhat.com/show_bug.cgi?id=2235265","https://access.redhat.com/errata/RHSA-2024:2289","https://access.redhat.com/security/cve/CVE-2023-40745","https://bugzilla.redhat.com/show_bug.cgi?id=2235265","https://security.netapp.com/advisory/ntap-20231110-0005/"],"published_time":"2023-10-05T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41175","summary":"A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00282,"ranking_epss":0.51675,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2289","https://access.redhat.com/security/cve/CVE-2023-41175","https://bugzilla.redhat.com/show_bug.cgi?id=2235264","https://access.redhat.com/errata/RHSA-2024:2289","https://access.redhat.com/security/cve/CVE-2023-41175","https://bugzilla.redhat.com/show_bug.cgi?id=2235264"],"published_time":"2023-10-05T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-42754","summary":"A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.01068,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-42754","https://bugzilla.redhat.com/show_bug.cgi?id=2239845","https://seclists.org/oss-sec/2023/q4/14","https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-42754","https://bugzilla.redhat.com/show_bug.cgi?id=2239845","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/","https://seclists.org/oss-sec/2023/q4/14"],"published_time":"2023-10-05T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5346","summary":"Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01115,"ranking_epss":0.78214,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop.html","https://crbug.com/1485829","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMFDRMWMT6ZBLGLLWSWHHRAUBOSUXQDR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA6HMWNOYQ56R35MHW77GVW7373Z4RSN/","https://security.gentoo.org/glsa/202401-34","https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop.html","https://crbug.com/1485829","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMFDRMWMT6ZBLGLLWSWHHRAUBOSUXQDR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA6HMWNOYQ56R35MHW77GVW7373Z4RSN/","https://security.gentoo.org/glsa/202401-34"],"published_time":"2023-10-05T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39191","summary":"An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.","cvss":8.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03362,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/errata/RHSA-2024:0381","https://access.redhat.com/errata/RHSA-2024:0439","https://access.redhat.com/errata/RHSA-2024:0448","https://access.redhat.com/security/cve/CVE-2023-39191","https://bugzilla.redhat.com/show_bug.cgi?id=2226783","https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/","https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/errata/RHSA-2024:0381","https://access.redhat.com/errata/RHSA-2024:0439","https://access.redhat.com/errata/RHSA-2024:0448","https://access.redhat.com/security/cve/CVE-2023-39191","https://bugzilla.redhat.com/show_bug.cgi?id=2226783","https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/"],"published_time":"2023-10-04T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3428","summary":"A heap-based buffer overflow vulnerability was found  in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service.","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05726,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-3428","https://bugzilla.redhat.com/show_bug.cgi?id=2218369","https://access.redhat.com/security/cve/CVE-2023-3428","https://bugzilla.redhat.com/show_bug.cgi?id=2218369"],"published_time":"2023-10-04T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3576","summary":"A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06185,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6575","https://access.redhat.com/security/cve/CVE-2023-3576","https://bugzilla.redhat.com/show_bug.cgi?id=2219340","https://access.redhat.com/errata/RHSA-2023:6575","https://access.redhat.com/security/cve/CVE-2023-3576","https://bugzilla.redhat.com/show_bug.cgi?id=2219340","https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html"],"published_time":"2023-10-04T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43804","summary":"urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.0095,"ranking_epss":0.76412,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb","https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d","https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f","https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/","https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb","https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d","https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f","https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html","https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/","https://security.netapp.com/advisory/ntap-20241213-0007/","https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3"],"published_time":"2023-10-04T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4911","summary":"A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.74256,"ranking_epss":0.98845,"kev":true,"propose_action":"GNU C Library's dynamic loader ld.so contains a buffer overflow vulnerability when processing the GLIBC_TUNABLES environment variable, allowing a local attacker to execute code with elevated privileges.","ransomware_campaign":"Unknown","references":["https://access.redhat.com/errata/RHSA-2023:5453","https://access.redhat.com/errata/RHSA-2023:5454","https://access.redhat.com/errata/RHSA-2023:5455","https://access.redhat.com/errata/RHSA-2023:5476","https://access.redhat.com/errata/RHSA-2024:0033","https://access.redhat.com/security/cve/CVE-2023-4911","https://bugzilla.redhat.com/show_bug.cgi?id=2238352","https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt","https://www.qualys.com/cve-2023-4911/","http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html","http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html","http://seclists.org/fulldisclosure/2023/Oct/11","http://www.openwall.com/lists/oss-security/2023/10/03/2","http://www.openwall.com/lists/oss-security/2023/10/03/3","http://www.openwall.com/lists/oss-security/2023/10/05/1","http://www.openwall.com/lists/oss-security/2023/10/13/11","http://www.openwall.com/lists/oss-security/2023/10/14/3","http://www.openwall.com/lists/oss-security/2023/10/14/5","http://www.openwall.com/lists/oss-security/2023/10/14/6","https://access.redhat.com/errata/RHSA-2023:5453","https://access.redhat.com/errata/RHSA-2023:5454","https://access.redhat.com/errata/RHSA-2023:5455","https://access.redhat.com/errata/RHSA-2023:5476","https://access.redhat.com/errata/RHSA-2024:0033","https://access.redhat.com/security/cve/CVE-2023-4911","https://bugzilla.redhat.com/show_bug.cgi?id=2238352","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/","https://security.gentoo.org/glsa/202310-03","https://security.netapp.com/advisory/ntap-20231013-0006/","https://www.debian.org/security/2023/dsa-5514","https://www.exploit-db.com/exploits/52479","https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt","https://www.qualys.com/cve-2023-4911/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-4911"],"published_time":"2023-10-03T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5345","summary":"A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705","https://kernel.dance/e6e43b8aa7cd3c3af686caf0c2e11819a886d705","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/","http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705","https://kernel.dance/e6e43b8aa7cd3c3af686caf0c2e11819a886d705","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/"],"published_time":"2023-10-03T03:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5344","summary":"Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.","cvss":4.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.0,"cvss_v4":null,"epss":0.00057,"ranking_epss":0.17887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Dec/10","http://seclists.org/fulldisclosure/2023/Dec/11","http://seclists.org/fulldisclosure/2023/Dec/9","https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04","https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4W665GQBN6S6ZDMYWVF4X7KMFI7AQKJL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZOXBUJLJ5VSPN3YXWN7XZA4JDYKNE7GZ/","https://support.apple.com/kb/HT214036","https://support.apple.com/kb/HT214037","https://support.apple.com/kb/HT214038","http://seclists.org/fulldisclosure/2023/Dec/10","http://seclists.org/fulldisclosure/2023/Dec/11","http://seclists.org/fulldisclosure/2023/Dec/9","https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04","https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf","https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4W665GQBN6S6ZDMYWVF4X7KMFI7AQKJL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZOXBUJLJ5VSPN3YXWN7XZA4JDYKNE7GZ/","https://support.apple.com/kb/HT214036","https://support.apple.com/kb/HT214037","https://support.apple.com/kb/HT214038"],"published_time":"2023-10-02T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-44488","summary":"VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01446,"ranking_epss":0.80783,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/09/30/4","https://bugzilla.redhat.com/show_bug.cgi?id=2241806","https://github.com/webmproject/libvpx/commit/263682c9a29395055f3b3afe2d97be1828a6223f","https://github.com/webmproject/libvpx/commit/df9fd9d5b7325060b2b921558a1eb20ca7880937","https://github.com/webmproject/libvpx/compare/v1.13.0...v1.13.1","https://github.com/webmproject/libvpx/releases/tag/v1.13.1","https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/","https://security.gentoo.org/glsa/202310-04","https://www.debian.org/security/2023/dsa-5518","http://www.openwall.com/lists/oss-security/2023/09/30/4","https://bugzilla.redhat.com/show_bug.cgi?id=2241806","https://github.com/webmproject/libvpx/commit/263682c9a29395055f3b3afe2d97be1828a6223f","https://github.com/webmproject/libvpx/commit/df9fd9d5b7325060b2b921558a1eb20ca7880937","https://github.com/webmproject/libvpx/compare/v1.13.0...v1.13.1","https://github.com/webmproject/libvpx/releases/tag/v1.13.1","https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/","https://security.gentoo.org/glsa/202310-04","https://www.debian.org/security/2023/dsa-5518"],"published_time":"2023-09-30T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43655","summary":"Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has `register_argc_argv` enabled in php.ini. Versions 2.6.4, 2.2.22 and 1.10.27 patch this vulnerability. Users are advised to upgrade. Users unable to upgrade should make sure `register_argc_argv` is disabled in php.ini, and avoid publishing composer.phar to the web as this is not best practice.","cvss":6.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.4,"cvss_v4":null,"epss":0.02069,"ranking_epss":0.83964,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d","https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c","https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c","https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf","https://lists.debian.org/debian-lts-announce/2024/03/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2WKFUO255T3BZTL72TNYJYH2XM5FG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AWYAUZNH565NWPIKGEIYBWHYNM5JGAE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFOPGPW2KS37O3KJWBRGTUWHTXCQXBS2/","https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d","https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c","https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c","https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf","https://lists.debian.org/debian-lts-announce/2024/03/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2WKFUO255T3BZTL72TNYJYH2XM5FG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AWYAUZNH565NWPIKGEIYBWHYNM5JGAE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFOPGPW2KS37O3KJWBRGTUWHTXCQXBS2/"],"published_time":"2023-09-29T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5186","summary":"Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0122,"ranking_epss":0.79091,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html","https://crbug.com/1478889","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5508","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html","https://crbug.com/1478889","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5508"],"published_time":"2023-09-28T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5187","summary":"Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00221,"ranking_epss":0.4475,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html","https://crbug.com/1475798","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5508","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html","https://crbug.com/1475798","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5508"],"published_time":"2023-09-28T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5217","summary":"Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03573,"ranking_epss":0.87744,"kev":true,"propose_action":"Google Chromium libvpx contains a heap buffer overflow vulnerability in vp8 encoding that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could impact web browsers using libvpx, including but not limited to Google Chrome.","ransomware_campaign":"Unknown","references":["http://seclists.org/fulldisclosure/2023/Oct/12","http://seclists.org/fulldisclosure/2023/Oct/16","http://www.openwall.com/lists/oss-security/2023/09/28/5","http://www.openwall.com/lists/oss-security/2023/09/28/6","http://www.openwall.com/lists/oss-security/2023/09/29/1","http://www.openwall.com/lists/oss-security/2023/09/29/11","http://www.openwall.com/lists/oss-security/2023/09/29/12","http://www.openwall.com/lists/oss-security/2023/09/29/14","http://www.openwall.com/lists/oss-security/2023/09/29/2","http://www.openwall.com/lists/oss-security/2023/09/29/7","http://www.openwall.com/lists/oss-security/2023/09/29/9","http://www.openwall.com/lists/oss-security/2023/09/30/1","http://www.openwall.com/lists/oss-security/2023/09/30/2","http://www.openwall.com/lists/oss-security/2023/09/30/3","http://www.openwall.com/lists/oss-security/2023/09/30/4","http://www.openwall.com/lists/oss-security/2023/09/30/5","http://www.openwall.com/lists/oss-security/2023/10/01/1","http://www.openwall.com/lists/oss-security/2023/10/01/2","http://www.openwall.com/lists/oss-security/2023/10/01/5","http://www.openwall.com/lists/oss-security/2023/10/02/6","http://www.openwall.com/lists/oss-security/2023/10/03/11","https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/","https://bugzilla.redhat.com/show_bug.cgi?id=2241191","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html","https://crbug.com/1486441","https://github.com/webmproject/libvpx/commit/3fbd1dca6a4d2dad332a2110d646e4ffef36d590","https://github.com/webmproject/libvpx/commit/af6dedd715f4307669366944cca6e0417b290282","https://github.com/webmproject/libvpx/releases/tag/v1.13.1","https://github.com/webmproject/libvpx/tags","https://lists.debian.org/debian-lts-announce/2023/09/msg00038.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://pastebin.com/TdkC4pDv","https://security-tracker.debian.org/tracker/CVE-2023-5217","https://security.gentoo.org/glsa/202310-04","https://security.gentoo.org/glsa/202401-34","https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217/","https://support.apple.com/kb/HT213961","https://support.apple.com/kb/HT213972","https://twitter.com/maddiestone/status/1707163313711497266","https://www.debian.org/security/2023/dsa-5508","https://www.debian.org/security/2023/dsa-5509","https://www.debian.org/security/2023/dsa-5510","https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/","https://www.openwall.com/lists/oss-security/2023/09/28/5","http://seclists.org/fulldisclosure/2023/Oct/12","http://seclists.org/fulldisclosure/2023/Oct/16","http://www.openwall.com/lists/oss-security/2023/09/28/5","http://www.openwall.com/lists/oss-security/2023/09/28/6","http://www.openwall.com/lists/oss-security/2023/09/29/1","http://www.openwall.com/lists/oss-security/2023/09/29/11","http://www.openwall.com/lists/oss-security/2023/09/29/12","http://www.openwall.com/lists/oss-security/2023/09/29/14","http://www.openwall.com/lists/oss-security/2023/09/29/2","http://www.openwall.com/lists/oss-security/2023/09/29/7","http://www.openwall.com/lists/oss-security/2023/09/29/9","http://www.openwall.com/lists/oss-security/2023/09/30/1","http://www.openwall.com/lists/oss-security/2023/09/30/2","http://www.openwall.com/lists/oss-security/2023/09/30/3","http://www.openwall.com/lists/oss-security/2023/09/30/4","http://www.openwall.com/lists/oss-security/2023/09/30/5","http://www.openwall.com/lists/oss-security/2023/10/01/1","http://www.openwall.com/lists/oss-security/2023/10/01/2","http://www.openwall.com/lists/oss-security/2023/10/01/5","http://www.openwall.com/lists/oss-security/2023/10/02/6","http://www.openwall.com/lists/oss-security/2023/10/03/11","https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/","https://bugzilla.redhat.com/show_bug.cgi?id=2241191","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html","https://crbug.com/1486441","https://github.com/webmproject/libvpx/commit/3fbd1dca6a4d2dad332a2110d646e4ffef36d590","https://github.com/webmproject/libvpx/commit/af6dedd715f4307669366944cca6e0417b290282","https://github.com/webmproject/libvpx/releases/tag/v1.13.1","https://github.com/webmproject/libvpx/tags","https://lists.debian.org/debian-lts-announce/2023/09/msg00038.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://pastebin.com/TdkC4pDv","https://security-tracker.debian.org/tracker/CVE-2023-5217","https://security.gentoo.org/glsa/202310-04","https://security.gentoo.org/glsa/202401-34","https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217/","https://support.apple.com/kb/HT213961","https://support.apple.com/kb/HT213972","https://twitter.com/maddiestone/status/1707163313711497266","https://www.debian.org/security/2023/dsa-5508","https://www.debian.org/security/2023/dsa-5509","https://www.debian.org/security/2023/dsa-5510","https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/","https://www.openwall.com/lists/oss-security/2023/09/28/5","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-5217"],"published_time":"2023-09-28T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-42756","summary":"A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":4e-05,"ranking_epss":0.00199,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/security/cve/CVE-2023-42756","https://bugzilla.redhat.com/show_bug.cgi?id=2239848","https://seclists.org/oss-sec/2023/q3/242","https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/security/cve/CVE-2023-42756","https://bugzilla.redhat.com/show_bug.cgi?id=2239848","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/","https://seclists.org/oss-sec/2023/q3/242"],"published_time":"2023-09-28T14:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-42822","summary":"xrdp is an open source remote desktop protocol server. Access to the font glyphs in xrdp_painter.c is not bounds-checked . Since some of this data is controllable by the user, this can result in an out-of-bounds read within the xrdp executable. The vulnerability allows an out-of-bounds read within a potentially privileged process. On non-Debian platforms, xrdp tends to run as root. Potentially an out-of-bounds write can follow the out-of-bounds read. There is no denial-of-service impact, providing xrdp is running in forking mode. This issue has been addressed in release 0.9.23.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00336,"ranking_epss":0.56504,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40","https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2hjx-rm4f-r9hw","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FPGA4M7IYCP7OILDF2ZJEVSXUOFEFQ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFGL22QQF65OIZRMCKUZCVJQCKGUBRYE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTXODUR4ILM7ZPA6ZGY6VSK4BBSBMKGY/","https://github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40","https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2hjx-rm4f-r9hw","https://lists.debian.org/debian-lts-announce/2025/05/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FPGA4M7IYCP7OILDF2ZJEVSXUOFEFQ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFGL22QQF65OIZRMCKUZCVJQCKGUBRYE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTXODUR4ILM7ZPA6ZGY6VSK4BBSBMKGY/"],"published_time":"2023-09-27T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5169","summary":"A compromised content process could have provided malicious data in a `PathRecording` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0024,"ranking_epss":0.47125,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.mozilla.org/show_bug.cgi?id=1846685","https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/","https://www.debian.org/security/2023/dsa-5506","https://www.debian.org/security/2023/dsa-5513","https://www.mozilla.org/security/advisories/mfsa2023-41/","https://www.mozilla.org/security/advisories/mfsa2023-42/","https://www.mozilla.org/security/advisories/mfsa2023-43/","https://bugzilla.mozilla.org/show_bug.cgi?id=1846685","https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/","https://www.debian.org/security/2023/dsa-5506","https://www.debian.org/security/2023/dsa-5513","https://www.mozilla.org/security/advisories/mfsa2023-41/","https://www.mozilla.org/security/advisories/mfsa2023-42/","https://www.mozilla.org/security/advisories/mfsa2023-43/"],"published_time":"2023-09-27T15:19:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5171","summary":"During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0026,"ranking_epss":0.49441,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.mozilla.org/show_bug.cgi?id=1851599","https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/","https://www.debian.org/security/2023/dsa-5506","https://www.debian.org/security/2023/dsa-5513","https://www.mozilla.org/security/advisories/mfsa2023-41/","https://www.mozilla.org/security/advisories/mfsa2023-42/","https://www.mozilla.org/security/advisories/mfsa2023-43/","https://bugzilla.mozilla.org/show_bug.cgi?id=1851599","https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/","https://www.debian.org/security/2023/dsa-5506","https://www.debian.org/security/2023/dsa-5513","https://www.mozilla.org/security/advisories/mfsa2023-41/","https://www.mozilla.org/security/advisories/mfsa2023-42/","https://www.mozilla.org/security/advisories/mfsa2023-43/"],"published_time":"2023-09-27T15:19:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5157","summary":"A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00596,"ranking_epss":0.6938,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:5259","https://access.redhat.com/errata/RHSA-2023:5683","https://access.redhat.com/errata/RHSA-2023:5684","https://access.redhat.com/errata/RHSA-2023:6821","https://access.redhat.com/errata/RHSA-2023:6822","https://access.redhat.com/errata/RHSA-2023:6883","https://access.redhat.com/errata/RHSA-2023:7633","https://access.redhat.com/security/cve/CVE-2023-5157","https://bugzilla.redhat.com/show_bug.cgi?id=2240246","https://access.redhat.com/errata/RHSA-2023:5683","https://access.redhat.com/errata/RHSA-2023:5684","https://access.redhat.com/errata/RHSA-2023:6821","https://access.redhat.com/errata/RHSA-2023:6822","https://access.redhat.com/errata/RHSA-2023:6883","https://access.redhat.com/errata/RHSA-2023:7633","https://access.redhat.com/security/cve/CVE-2023-5157","https://bugzilla.redhat.com/show_bug.cgi?id=2240246"],"published_time":"2023-09-27T15:19:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-42453","summary":"Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. Users were able to forge read receipts for any event (if they knew the room ID and event ID). Note that the users were not able to view the events, but simply mark it as read. This could be confusing as clients will show the event as read by the user, even if they are not in the room. This issue has been patched in version 1.93.0. Users are advised to upgrade. There are no known workarounds for this issue.","cvss":3.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00225,"ranking_epss":0.45369,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/matrix-org/synapse/pull/16327","https://github.com/matrix-org/synapse/security/advisories/GHSA-7565-cq32-vx2x","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/","https://security.gentoo.org/glsa/202401-12","https://github.com/matrix-org/synapse/pull/16327","https://github.com/matrix-org/synapse/security/advisories/GHSA-7565-cq32-vx2x","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/","https://security.gentoo.org/glsa/202401-12"],"published_time":"2023-09-27T15:19:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41335","summary":"Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. When users update their passwords, the new credentials may be briefly held in the server database. While this doesn't grant the server any added capabilities—it already learns the users' passwords as part of the authentication process—it does disrupt the expectation that passwords won't be stored in the database. As a result, these passwords could inadvertently be captured in database backups for a longer duration. These temporarily stored passwords are automatically erased after a 48-hour window. This issue has been addressed in version 1.93.0. Users are advised to upgrade. There are no known workarounds for this issue.","cvss":3.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00175,"ranking_epss":0.38975,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/matrix-org/synapse/pull/16272","https://github.com/matrix-org/synapse/security/advisories/GHSA-4f74-84v3-j9q5","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/","https://security.gentoo.org/glsa/202401-12","https://github.com/matrix-org/synapse/pull/16272","https://github.com/matrix-org/synapse/security/advisories/GHSA-4f74-84v3-j9q5","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/","https://security.gentoo.org/glsa/202401-12"],"published_time":"2023-09-27T15:19:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41074","summary":"The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01121,"ranking_epss":0.78274,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Oct/10","http://seclists.org/fulldisclosure/2023/Oct/2","http://seclists.org/fulldisclosure/2023/Oct/3","http://seclists.org/fulldisclosure/2023/Oct/8","http://seclists.org/fulldisclosure/2023/Oct/9","http://www.openwall.com/lists/oss-security/2023/09/28/3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/","https://security.gentoo.org/glsa/202401-33","https://support.apple.com/en-us/HT213936","https://support.apple.com/en-us/HT213937","https://support.apple.com/en-us/HT213938","https://support.apple.com/en-us/HT213940","https://support.apple.com/en-us/HT213941","https://www.debian.org/security/2023/dsa-5527","http://seclists.org/fulldisclosure/2023/Oct/10","http://seclists.org/fulldisclosure/2023/Oct/2","http://seclists.org/fulldisclosure/2023/Oct/3","http://seclists.org/fulldisclosure/2023/Oct/8","http://seclists.org/fulldisclosure/2023/Oct/9","http://www.openwall.com/lists/oss-security/2023/09/28/3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/","https://security.gentoo.org/glsa/202401-33","https://support.apple.com/en-us/HT213936","https://support.apple.com/en-us/HT213937","https://support.apple.com/en-us/HT213938","https://support.apple.com/en-us/HT213940","https://support.apple.com/en-us/HT213941","https://webkitgtk.org/security/WSA-2023-0009.html","https://www.debian.org/security/2023/dsa-5527"],"published_time":"2023-09-27T15:19:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35074","summary":"The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00598,"ranking_epss":0.69447,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Oct/10","http://seclists.org/fulldisclosure/2023/Oct/2","http://seclists.org/fulldisclosure/2023/Oct/3","http://seclists.org/fulldisclosure/2023/Oct/8","http://seclists.org/fulldisclosure/2023/Oct/9","http://www.openwall.com/lists/oss-security/2023/09/28/3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/","https://security.gentoo.org/glsa/202401-33","https://support.apple.com/en-us/HT213936","https://support.apple.com/en-us/HT213937","https://support.apple.com/en-us/HT213938","https://support.apple.com/en-us/HT213940","https://support.apple.com/en-us/HT213941","http://seclists.org/fulldisclosure/2023/Oct/10","http://seclists.org/fulldisclosure/2023/Oct/2","http://seclists.org/fulldisclosure/2023/Oct/3","http://seclists.org/fulldisclosure/2023/Oct/8","http://seclists.org/fulldisclosure/2023/Oct/9","http://www.openwall.com/lists/oss-security/2023/09/28/3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/","https://security.gentoo.org/glsa/202401-33","https://support.apple.com/en-us/HT213936","https://support.apple.com/en-us/HT213937","https://support.apple.com/en-us/HT213938","https://support.apple.com/en-us/HT213940","https://support.apple.com/en-us/HT213941","https://webkitgtk.org/security/WSA-2023-0009.html"],"published_time":"2023-09-27T15:18:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4318","summary":"A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:1033","https://access.redhat.com/errata/RHSA-2023:1503","https://access.redhat.com/security/cve/CVE-2022-4318","https://bugzilla.redhat.com/show_bug.cgi?id=2152703","https://access.redhat.com/errata/RHSA-2023:1033","https://access.redhat.com/errata/RHSA-2023:1503","https://access.redhat.com/security/cve/CVE-2022-4318","https://bugzilla.redhat.com/show_bug.cgi?id=2152703"],"published_time":"2023-09-25T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4156","summary":"A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08786,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-4156","https://bugzilla.redhat.com/show_bug.cgi?id=2215930","https://access.redhat.com/security/cve/CVE-2023-4156","https://bugzilla.redhat.com/show_bug.cgi?id=2215930"],"published_time":"2023-09-25T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-42811","summary":"aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0 and prior to version 0.10.3, in the AES GCM implementation of decrypt_in_place_detached, the decrypted ciphertext (i.e. the correct plaintext) is exposed even if tag verification fails. If a program using the `aes-gcm` crate's `decrypt_in_place*` APIs accesses the buffer after decryption failure, it will contain a decryption of an unauthenticated input. Depending on the specific nature of the program this may enable Chosen Ciphertext Attacks (CCAs) which can cause a catastrophic breakage of the cipher including full plaintext recovery. Version 0.10.3 contains a fix for this issue.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.0405,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.rs/aes-gcm/latest/src/aes_gcm/lib.rs.html#309","https://github.com/RustCrypto/AEADs/security/advisories/GHSA-423w-p2w9-r7vq","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROBB6TBDAGEQ2WIINR34F3DPSN3FND6K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYQCICN6BVC6I75O3F6W4VK4J3MOYDJU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U67ZSMNX5V3WTBYPUYF45PSFG4SF5SGF/","https://docs.rs/aes-gcm/latest/src/aes_gcm/lib.rs.html#309","https://github.com/RustCrypto/AEADs/security/advisories/GHSA-423w-p2w9-r7vq","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROBB6TBDAGEQ2WIINR34F3DPSN3FND6K/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYQCICN6BVC6I75O3F6W4VK4J3MOYDJU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U67ZSMNX5V3WTBYPUYF45PSFG4SF5SGF/"],"published_time":"2023-09-22T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-5002","summary":"A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.","cvss":6.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.0,"cvss_v4":null,"epss":0.27209,"ranking_epss":0.96401,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2239164","https://github.com/pgadmin-org/pgadmin4/issues/6763","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2S24D3S2GVNGTDNE6SF2OQSOPU3H72UW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VIRTMQZEE6K7RD37ERZ2UFYFLEUXLQU3/","https://bugzilla.redhat.com/show_bug.cgi?id=2239164","https://github.com/pgadmin-org/pgadmin4/issues/6763","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2S24D3S2GVNGTDNE6SF2OQSOPU3H72UW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VIRTMQZEE6K7RD37ERZ2UFYFLEUXLQU3/"],"published_time":"2023-09-22T14:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43090","summary":"A vulnerability was found in GNOME Shell. GNOME Shell's lock screen allows an unauthenticated local user to view windows of the locked desktop session by using keyboard shortcuts to unlock the restricted functionality of the screenshot tool.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00093,"ranking_epss":0.25977,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-43090","https://bugzilla.redhat.com/show_bug.cgi?id=2239087","https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/6990","https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/2944","https://access.redhat.com/security/cve/CVE-2023-43090","https://bugzilla.redhat.com/show_bug.cgi?id=2239087","https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/6990","https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/2944"],"published_time":"2023-09-22T06:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4504","summary":"Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10307,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/OpenPrinting/cups/releases/tag/v2.4.7","https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h","https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6","https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/","https://takeonme.org/cves/CVE-2023-4504.html","http://seclists.org/fulldisclosure/2024/Sep/33","https://github.com/OpenPrinting/cups/releases/tag/v2.4.7","https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h","https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6","https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/","https://takeonme.org/cves/CVE-2023-4504.html"],"published_time":"2023-09-21T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41993","summary":"The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.24414,"ranking_epss":0.96123,"kev":true,"propose_action":"Apple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.","ransomware_campaign":"Unknown","references":["https://security.gentoo.org/glsa/202401-33","https://security.netapp.com/advisory/ntap-20240426-0004/","https://support.apple.com/en-us/HT213940","https://security.gentoo.org/glsa/202401-33","https://security.netapp.com/advisory/ntap-20240426-0004/","https://support.apple.com/en-us/HT213940","https://support.apple.com/kb/HT213926","https://support.apple.com/kb/HT213930","https://webkitgtk.org/security/WSA-2023-0009.html","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41993"],"published_time":"2023-09-21T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43669","summary":"The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03217,"ranking_epss":0.87061,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2240110","https://bugzilla.suse.com/show_bug.cgi?id=1215563","https://crates.io/crates/tungstenite/versions","https://cwe.mitre.org/data/definitions/407.html","https://github.com/advisories/GHSA-9mcr-873m-xcxp","https://github.com/github/advisory-database/pull/2752","https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2","https://github.com/snapview/tungstenite-rs/issues/376","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/","https://security-tracker.debian.org/tracker/CVE-2023-43669","https://bugzilla.redhat.com/show_bug.cgi?id=2240110","https://bugzilla.suse.com/show_bug.cgi?id=1215563","https://crates.io/crates/tungstenite/versions","https://cwe.mitre.org/data/definitions/407.html","https://github.com/advisories/GHSA-9mcr-873m-xcxp","https://github.com/github/advisory-database/pull/2752","https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2","https://github.com/snapview/tungstenite-rs/issues/376","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/","https://security-tracker.debian.org/tracker/CVE-2023-43669"],"published_time":"2023-09-21T06:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4236","summary":"A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load.\nThis issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00177,"ranking_epss":0.39226,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/09/20/2","https://kb.isc.org/docs/cve-2023-4236","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/","https://security.netapp.com/advisory/ntap-20231013-0004/","https://www.debian.org/security/2023/dsa-5504","http://www.openwall.com/lists/oss-security/2023/09/20/2","https://kb.isc.org/docs/cve-2023-4236","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/","https://security.netapp.com/advisory/ntap-20231013-0004/","https://www.debian.org/security/2023/dsa-5504"],"published_time":"2023-09-20T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3341","summary":"The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary.\nThis issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00247,"ranking_epss":0.47984,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/09/20/2","https://kb.isc.org/docs/cve-2023-3341","https://lists.debian.org/debian-lts-announce/2024/01/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/","https://security.netapp.com/advisory/ntap-20231013-0003/","https://www.debian.org/security/2023/dsa-5504","http://www.openwall.com/lists/oss-security/2023/09/20/2","https://kb.isc.org/docs/cve-2023-3341","https://lists.debian.org/debian-lts-announce/2024/01/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/","https://security.netapp.com/advisory/ntap-20231013-0003/","https://www.debian.org/security/2023/dsa-5504"],"published_time":"2023-09-20T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4527","summary":"A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00105,"ranking_epss":0.28561,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:5453","https://access.redhat.com/errata/RHSA-2023:5455","https://access.redhat.com/security/cve/CVE-2023-4527","https://bugzilla.redhat.com/show_bug.cgi?id=2234712","http://www.openwall.com/lists/oss-security/2023/09/25/1","https://access.redhat.com/errata/RHSA-2023:5453","https://access.redhat.com/errata/RHSA-2023:5455","https://access.redhat.com/security/cve/CVE-2023-4527","https://bugzilla.redhat.com/show_bug.cgi?id=2234712","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/","https://security.gentoo.org/glsa/202310-03","https://security.netapp.com/advisory/ntap-20231116-0012/"],"published_time":"2023-09-18T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4806","summary":"A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.01895,"ranking_epss":0.83243,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHBA-2024:2413","https://access.redhat.com/errata/RHSA-2023:5453","https://access.redhat.com/errata/RHSA-2023:5455","https://access.redhat.com/errata/RHSA-2023:7409","https://access.redhat.com/security/cve/CVE-2023-4806","https://bugzilla.redhat.com/show_bug.cgi?id=2237782","http://www.openwall.com/lists/oss-security/2023/10/03/4","http://www.openwall.com/lists/oss-security/2023/10/03/5","http://www.openwall.com/lists/oss-security/2023/10/03/6","http://www.openwall.com/lists/oss-security/2023/10/03/8","https://access.redhat.com/errata/RHSA-2023:5453","https://access.redhat.com/errata/RHSA-2023:5455","https://access.redhat.com/errata/RHSA-2023:7409","https://access.redhat.com/security/cve/CVE-2023-4806","https://bugzilla.redhat.com/show_bug.cgi?id=2237782","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/","https://security.gentoo.org/glsa/202310-03","https://security.netapp.com/advisory/ntap-20240125-0008/"],"published_time":"2023-09-18T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43115","summary":"In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.21677,"ranking_epss":0.95751,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugs.ghostscript.com/show_bug.cgi?id=707051","https://ghostscript.com/","https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=e59216049cac290fb437a04c4f41ea46826cfba5","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IK3UXJ5HKMPAL5EQELJAWSRPA2AUOJJO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PG5AQV7JOL5TAU76FWPJCMSKO5DREKV5/","https://bugs.ghostscript.com/show_bug.cgi?id=707051","https://ghostscript.com/","https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=e59216049cac290fb437a04c4f41ea46826cfba5","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IK3UXJ5HKMPAL5EQELJAWSRPA2AUOJJO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PG5AQV7JOL5TAU76FWPJCMSKO5DREKV5/"],"published_time":"2023-09-18T08:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38039","summary":"When curl retrieves an HTTP response, it stores the incoming headers so that\nthey can be accessed later via the libcurl headers API.\n\nHowever, curl did not have a limit in how many or how large headers it would\naccept in a response, allowing a malicious server to stream an endless series\nof headers and eventually cause curl to run out of heap memory.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.12305,"ranking_epss":0.93893,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Oct/17","http://seclists.org/fulldisclosure/2024/Jan/34","http://seclists.org/fulldisclosure/2024/Jan/37","http://seclists.org/fulldisclosure/2024/Jan/38","https://hackerone.com/reports/2072338","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20231013-0005/","https://support.apple.com/kb/HT214036","https://support.apple.com/kb/HT214057","https://support.apple.com/kb/HT214058","https://support.apple.com/kb/HT214063","https://www.insyde.com/security-pledge/SA-2023064","http://seclists.org/fulldisclosure/2023/Oct/17","http://seclists.org/fulldisclosure/2024/Jan/34","http://seclists.org/fulldisclosure/2024/Jan/37","http://seclists.org/fulldisclosure/2024/Jan/38","https://hackerone.com/reports/2072338","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20231013-0005/","https://support.apple.com/kb/HT214036","https://support.apple.com/kb/HT214057","https://support.apple.com/kb/HT214058","https://support.apple.com/kb/HT214063","https://www.insyde.com/security-pledge/SA-2023064"],"published_time":"2023-09-15T04:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4155","summary":"A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01845,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-4155","https://bugzilla.redhat.com/show_bug.cgi?id=2213802","https://access.redhat.com/security/cve/CVE-2023-4155","https://bugzilla.redhat.com/show_bug.cgi?id=2213802"],"published_time":"2023-09-13T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3255","summary":"A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00117,"ranking_epss":0.30544,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2135","https://access.redhat.com/errata/RHSA-2024:2962","https://access.redhat.com/security/cve/CVE-2023-3255","https://bugzilla.redhat.com/show_bug.cgi?id=2218486","https://access.redhat.com/errata/RHSA-2024:2135","https://access.redhat.com/errata/RHSA-2024:2962","https://access.redhat.com/security/cve/CVE-2023-3255","https://bugzilla.redhat.com/show_bug.cgi?id=2218486","https://security.netapp.com/advisory/ntap-20231020-0008/"],"published_time":"2023-09-13T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4813","summary":"A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00304,"ranking_epss":0.53711,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHBA-2024:2413","https://access.redhat.com/errata/RHSA-2023:5453","https://access.redhat.com/errata/RHSA-2023:5455","https://access.redhat.com/errata/RHSA-2023:7409","https://access.redhat.com/security/cve/CVE-2023-4813","https://bugzilla.redhat.com/show_bug.cgi?id=2237798","http://www.openwall.com/lists/oss-security/2023/10/03/8","https://access.redhat.com/errata/RHSA-2023:5453","https://access.redhat.com/errata/RHSA-2023:5455","https://access.redhat.com/errata/RHSA-2023:7409","https://access.redhat.com/security/cve/CVE-2023-4813","https://bugzilla.redhat.com/show_bug.cgi?id=2237798","https://security.netapp.com/advisory/ntap-20231110-0003/"],"published_time":"2023-09-12T22:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4908","summary":"Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00271,"ranking_epss":0.50619,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1451543","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1451543","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499"],"published_time":"2023-09-12T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4909","summary":"Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00271,"ranking_epss":0.50619,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1463293","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1463293","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499"],"published_time":"2023-09-12T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4900","summary":"Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00271,"ranking_epss":0.50619,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1430867","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1430867","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499"],"published_time":"2023-09-12T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4901","summary":"Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00271,"ranking_epss":0.50619,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1459281","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1459281","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499"],"published_time":"2023-09-12T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4902","summary":"Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00271,"ranking_epss":0.50619,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1454515","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1454515","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499"],"published_time":"2023-09-12T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4903","summary":"Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00271,"ranking_epss":0.50619,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1446709","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1446709","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499"],"published_time":"2023-09-12T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4904","summary":"Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.20802,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1453501","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1453501","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499"],"published_time":"2023-09-12T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4905","summary":"Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00271,"ranking_epss":0.50619,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1441228","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1441228","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499"],"published_time":"2023-09-12T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4906","summary":"Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0005,"ranking_epss":0.15429,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1449874","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1449874","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499"],"published_time":"2023-09-12T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4907","summary":"Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00271,"ranking_epss":0.50619,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1462104","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html","https://crbug.com/1462104","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5499"],"published_time":"2023-09-12T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4863","summary":"Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.93606,"ranking_epss":0.99837,"kev":true,"propose_action":"Google Chromium WebP contains a heap-based buffer overflow vulnerability that allows a remote attacker to perform an out-of-bounds memory write via a crafted HTML page. This vulnerability can affect applications that use the WebP Codec.","ransomware_campaign":"Unknown","references":["http://www.openwall.com/lists/oss-security/2023/09/21/4","http://www.openwall.com/lists/oss-security/2023/09/22/1","http://www.openwall.com/lists/oss-security/2023/09/22/3","http://www.openwall.com/lists/oss-security/2023/09/22/4","http://www.openwall.com/lists/oss-security/2023/09/22/5","http://www.openwall.com/lists/oss-security/2023/09/22/6","http://www.openwall.com/lists/oss-security/2023/09/22/7","http://www.openwall.com/lists/oss-security/2023/09/22/8","http://www.openwall.com/lists/oss-security/2023/09/26/1","http://www.openwall.com/lists/oss-security/2023/09/26/7","http://www.openwall.com/lists/oss-security/2023/09/28/1","http://www.openwall.com/lists/oss-security/2023/09/28/2","http://www.openwall.com/lists/oss-security/2023/09/28/4","https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/","https://blog.isosceles.com/the-webp-0day/","https://bugzilla.suse.com/show_bug.cgi?id=1215231","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html","https://crbug.com/1479274","https://en.bandisoft.com/honeyview/history/","https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a","https://github.com/webmproject/libwebp/releases/tag/v1.3.2","https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863","https://news.ycombinator.com/item?id=37478403","https://security-tracker.debian.org/tracker/CVE-2023-4863","https://security.gentoo.org/glsa/202309-05","https://security.gentoo.org/glsa/202401-10","https://security.netapp.com/advisory/ntap-20230929-0011/","https://sethmlarson.dev/security-developer-in-residence-weekly-report-16","https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/","https://www.bentley.com/advisories/be-2023-0001/","https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/","https://www.debian.org/security/2023/dsa-5496","https://www.debian.org/security/2023/dsa-5497","https://www.debian.org/security/2023/dsa-5498","https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/","http://www.openwall.com/lists/oss-security/2023/09/21/4","http://www.openwall.com/lists/oss-security/2023/09/22/1","http://www.openwall.com/lists/oss-security/2023/09/22/3","http://www.openwall.com/lists/oss-security/2023/09/22/4","http://www.openwall.com/lists/oss-security/2023/09/22/5","http://www.openwall.com/lists/oss-security/2023/09/22/6","http://www.openwall.com/lists/oss-security/2023/09/22/7","http://www.openwall.com/lists/oss-security/2023/09/22/8","http://www.openwall.com/lists/oss-security/2023/09/26/1","http://www.openwall.com/lists/oss-security/2023/09/26/7","http://www.openwall.com/lists/oss-security/2023/09/28/1","http://www.openwall.com/lists/oss-security/2023/09/28/2","http://www.openwall.com/lists/oss-security/2023/09/28/4","https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/","https://blog.isosceles.com/the-webp-0day/","https://bugzilla.suse.com/show_bug.cgi?id=1215231","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html","https://crbug.com/1479274","https://en.bandisoft.com/honeyview/history/","https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a","https://github.com/webmproject/libwebp/releases/tag/v1.3.2","https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863","https://news.ycombinator.com/item?id=37478403","https://security-tracker.debian.org/tracker/CVE-2023-4863","https://security.gentoo.org/glsa/202309-05","https://security.gentoo.org/glsa/202401-10","https://security.netapp.com/advisory/ntap-20230929-0011/","https://sethmlarson.dev/security-developer-in-residence-weekly-report-16","https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/","https://www.bentley.com/advisories/be-2023-0001/","https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/","https://www.debian.org/security/2023/dsa-5496","https://www.debian.org/security/2023/dsa-5497","https://www.debian.org/security/2023/dsa-5498","https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/","https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-4863"],"published_time":"2023-09-12T15:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40032","summary":"libvips is a demand-driven, horizontally threaded image processing library. A specially crafted SVG input can cause libvips versions 8.14.3 or earlier to segfault when attempting to parse a malformed UTF-8 character. Users should upgrade to libvips version 8.14.4 (or later) when processing untrusted input.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0012,"ranking_epss":0.30959,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/libvips/libvips/commit/e091d65835966ef56d53a4105a7362cafdb1582b","https://github.com/libvips/libvips/pull/3604","https://github.com/libvips/libvips/security/advisories/GHSA-33qp-9pq7-9584","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YU2FFC47X2XDEGEHEWAGLU5L3R6FEYD2/","https://github.com/libvips/libvips/commit/e091d65835966ef56d53a4105a7362cafdb1582b","https://github.com/libvips/libvips/pull/3604","https://github.com/libvips/libvips/security/advisories/GHSA-33qp-9pq7-9584","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YU2FFC47X2XDEGEHEWAGLU5L3R6FEYD2/"],"published_time":"2023-09-11T19:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41915","summary":"OpenPMIx PMIx before 4.2.6 and 5.0.x before 5.0.1 allows attackers to obtain ownership of arbitrary files via a race condition during execution of library code with UID 0.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01033,"ranking_epss":0.77397,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/07/10/3","http://www.openwall.com/lists/oss-security/2024/07/10/4","http://www.openwall.com/lists/oss-security/2024/07/10/6","http://www.openwall.com/lists/oss-security/2024/07/11/3","https://docs.openpmix.org/en/latest/security.html","https://github.com/openpmix/openpmix/releases/tag/v4.2.6","https://github.com/openpmix/openpmix/releases/tag/v5.0.1","https://lists.debian.org/debian-lts-announce/2023/10/msg00048.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFKIY6SNC3KQNZMVROWMIW6DI5XPNKQX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYJ7IRNR6NHJMTNOV3E3W3D5MLDRDCJX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YDLWSMQYXF2ZGOQKCG26H6ZZA5FEH7HX/","https://www.debian.org/security/2023/dsa-5547","http://www.openwall.com/lists/oss-security/2024/07/10/3","http://www.openwall.com/lists/oss-security/2024/07/10/4","http://www.openwall.com/lists/oss-security/2024/07/10/6","http://www.openwall.com/lists/oss-security/2024/07/11/3","https://docs.openpmix.org/en/latest/security.html","https://github.com/openpmix/openpmix/releases/tag/v4.2.6","https://github.com/openpmix/openpmix/releases/tag/v5.0.1","https://lists.debian.org/debian-lts-announce/2023/10/msg00048.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFKIY6SNC3KQNZMVROWMIW6DI5XPNKQX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYJ7IRNR6NHJMTNOV3E3W3D5MLDRDCJX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YDLWSMQYXF2ZGOQKCG26H6ZZA5FEH7HX/","https://www.debian.org/security/2023/dsa-5547"],"published_time":"2023-09-09T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39511","summary":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The script under `reports_admin.php` displays reporting information about graphs, devices, data sources etc. _CENSUS_ found that an adversary that is able to configure a malicious device name, related to a graph attached to a report, can deploy a stored XSS attack against any super user who has privileges of viewing the `reports_admin.php` page, such as administrative accounts. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http://<HOST>/cacti/host.php`, while the rendered malicious payload is exhibited at `http://<HOST>/cacti/reports_admin.php` when the a graph with the maliciously altered device name is linked to the report. This issue has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to upgrade should manually filter HTML output.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00561,"ranking_epss":0.68335,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-5hpr-4hhc-8q42","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://github.com/Cacti/cacti/security/advisories/GHSA-5hpr-4hhc-8q42","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/"],"published_time":"2023-09-06T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39365","summary":"Cacti is an open source operational monitoring and fault management framework. Issues with Cacti Regular Expression validation combined with the external links feature can lead to limited SQL Injections and subsequent data leakage. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.0017,"ranking_epss":0.3826,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-v5w7-hww7-2f22","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-v5w7-hww7-2f22","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39516","summary":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The script under `data_sources.php` displays the data source management information (e.g. data source path, polling configuration etc.) for different data visualizations of the _cacti_ app. CENSUS found that an adversary that is able to configure a malicious data-source path, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the 'General Administration>Sites/Devices/Data' permissions can configure the data source path in Cacti. This configuration occurs through `http://<HOST>/cacti/data_sources.php`. The same page can be used for previewing the data source path. This issue has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to upgrade should manually escape HTML output.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00284,"ranking_epss":0.51826,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-r8qq-88g3-hmgv","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-r8qq-88g3-hmgv","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4761","summary":"Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00368,"ranking_epss":0.58802,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html","https://crbug.com/1476403","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5491","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html","https://crbug.com/1476403","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5491"],"published_time":"2023-09-05T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4762","summary":"Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.64635,"ranking_epss":0.98464,"kev":true,"propose_action":"Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html","https://crbug.com/1473247","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4762","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5491","https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html","https://crbug.com/1473247","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4762","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5491","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-4762"],"published_time":"2023-09-05T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-30534","summary":"Cacti is an open source operational monitoring and fault management framework. There are two instances of insecure deserialization in Cacti version 1.2.24. While a viable gadget chain exists in Cacti’s vendor directory (phpseclib), the necessary gadgets are not included, making them inaccessible and the insecure deserializations not exploitable. Each instance of insecure deserialization is due to using the unserialize function without sanitizing the user input. Cacti has a “safe” deserialization that attempts to sanitize the content and check for specific values before calling unserialize, but it isn’t used in these instances. The vulnerable code lies in graphs_new.php, specifically within the host_new_graphs_save function. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.48534,"ranking_epss":0.97759,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-77rf-774j-6h3p","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.fastly.com/blog/cve-2023-30534-insecure-deserialization-in-cacti-prior-to-1-2-25","https://github.com/Cacti/cacti/security/advisories/GHSA-77rf-774j-6h3p","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.fastly.com/blog/cve-2023-30534-insecure-deserialization-in-cacti-prior-to-1-2-25"],"published_time":"2023-09-05T22:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39357","summary":"Cacti is an open source operational monitoring and fault management framework. A defect in the sql_save function was discovered. When the column type is numeric, the sql_save function directly utilizes user input. Many files and functions calling the sql_save function do not perform prior validation of user input, leading to the existence of multiple SQL injection vulnerabilities in Cacti. This allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03246,"ranking_epss":0.87134,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-6jhp-mgqg-fhqg","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-6jhp-mgqg-fhqg","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T22:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39358","summary":"Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `reports_user.php` file. In `ajax_get_branches`, the `tree_id` parameter is passed to the `reports_get_branch_select` function without any validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03993,"ranking_epss":0.88428,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/"],"published_time":"2023-09-05T22:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39362","summary":"Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.87228,"ranking_epss":0.99452,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html","https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html","https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://www.vicarius.io/vsociety/posts/command-injection-in-cacti-cve-2023-39362"],"published_time":"2023-09-05T22:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39364","summary":"Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, users with console access can be redirected to an arbitrary website after a change password performed via a specifically crafted URL. The `auth_changepassword.php` file accepts `ref` as a URL parameter and reflects it in the form used to perform the change password. It's value is used to perform a redirect via `header` PHP function. A user can be tricked in performing the change password operation, e.g., via a phishing message, and then interacting with the malicious website where the redirection has been performed, e.g., downloading malwares, providing credentials, etc. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":3.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00166,"ranking_epss":0.37678,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-4pjv-rmrp-r59x","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-4pjv-rmrp-r59x","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T22:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39510","summary":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The`reports_admin.php` script displays reporting information about graphs, devices, data sources etc.\nCENSUS found that an adversary that is able to configure a malicious Device name, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http://<HOST>/cacti/host.php`, while the rendered malicious payload is exhibited at `http://<HOST>/cacti/reports_admin.php` when the a graph with the maliciously altered device name is linked to the report. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00493,"ranking_epss":0.65761,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-24w4-4hp2-3j8h","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-24w4-4hp2-3j8h","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T21:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39512","summary":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The script under `data_sources.php` displays the data source management information (e.g. data source path, polling configuration, device name related to the datasource etc.) for different data visualizations of the _cacti_ app. _CENSUS_ found that an adversary that is able to configure a malicious device name, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http://<HOST>/cacti/host.php`, while the rendered malicious payload is exhibited at `http://<HOST>/cacti/data_sources.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00493,"ranking_epss":0.65761,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-vqcc-5v63-g9q7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-vqcc-5v63-g9q7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T21:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39513","summary":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The script under `host.php` is used to monitor and manage hosts in the _cacti_ app, hence displays useful information such as data queries and verbose logs. _CENSUS_ found that an adversary that is able to configure a data-query template with malicious code appended in the template path, in order to deploy a stored XSS attack against any user with the _General Administration>Sites/Devices/Data_ privileges. A user that possesses the _Template Editor>Data Queries_ permissions can configure the data query template path in _cacti_. Please note that such a user may be a low privileged user. This configuration occurs through `http://<HOST>/cacti/data_queries.php` by editing an existing or adding a new data query template. If a template is linked to a device then the formatted template path will be rendered in the device's management page, when a _verbose data query_ is requested. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00296,"ranking_epss":0.5294,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-9fj7-8f2j-2rw2","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-9fj7-8f2j-2rw2","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T21:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39514","summary":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The script under `graphs.php` displays graph details such as data-source paths, data template information and graph related fields. _CENSUS_ found that an adversary that is able to configure either a data-source template with malicious code appended in the data-source name or a device with a malicious payload injected in the device name, may deploy a stored XSS attack against any user with _General Administration>Graphs_ privileges. A user that possesses the _Template Editor>Data Templates_ permissions can configure the data-source name in _cacti_. Please note that this may be a _low privileged_ user. This configuration occurs through `http://<HOST>/cacti/data_templates.php` by editing an existing or adding a new data template. If a template is linked to a graph then the formatted template name will be rendered in the graph's management page. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device name in _cacti_. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to upgrade should add manual HTML escaping.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.0032,"ranking_epss":0.55142,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-6hrc-2cfc-8hm7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-6hrc-2cfc-8hm7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T21:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39515","summary":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the cacti's database. These data will be viewed by administrative cacti accounts and execute JavaScript code in the victim's browser at view-time. The script under `data_debug.php` displays data source related debugging information such as _data source paths, polling settings, meta-data on the data source_. _CENSUS_ found that an adversary that is able to configure a malicious data-source path, can deploy a stored XSS attack against any user that has privileges related to viewing the `data_debug.php` information. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the data source path in _cacti_. This configuration occurs through `http://<HOST>/cacti/data_sources.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00258,"ranking_epss":0.49205,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T21:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39359","summary":"Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `graphs.php` file. When dealing with the cases of ajax_hosts and ajax_hosts_noany, if the `site_id` parameter is greater than 0, it is directly reflected in the WHERE clause of the SQL statement. This creates an SQL injection vulnerability. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04724,"ranking_epss":0.89406,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T21:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39360","summary":"Cacti is an open source operational monitoring and fault management framework.Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data. The vulnerability is found in `graphs_new.php`. Several validations are performed, but the `returnto` parameter is directly passed to `form_save_button`. In order to bypass this validation, returnto must contain `host.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00629,"ranking_epss":0.70317,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-gx8c-xvjh-9qh4","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://github.com/Cacti/cacti/security/advisories/GHSA-gx8c-xvjh-9qh4","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/"],"published_time":"2023-09-05T21:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39361","summary":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.92278,"ranking_epss":0.9972,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg","https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T21:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39366","summary":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The `data_sources.php` script displays the data source management information (e.g. data source path, polling configuration etc.) for different data visualizations of the _cacti_ app. \nCENSUS found that an adversary that is able to configure a malicious Device name, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http://<HOST>/cacti/host.php`, while the rendered malicious payload is exhibited at `http://<HOST>/cacti/data_sources.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00363,"ranking_epss":0.58411,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Cacti/cacti/security/advisories/GHSA-rwhh-xxm6-vcrv","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550","https://github.com/Cacti/cacti/security/advisories/GHSA-rwhh-xxm6-vcrv","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/","https://www.debian.org/security/2023/dsa-5550"],"published_time":"2023-09-05T21:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41909","summary":"An issue was discovered in FRRouting FRR through 9.0. bgp_nlri_parse_flowspec in bgpd/bgp_flowspec.c processes malformed requests with no attributes, leading to a NULL pointer dereference.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00103,"ranking_epss":0.28215,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FRRouting/frr/pull/13222/commits/cfd04dcb3e689754a72507d086ba3b9709fc5ed8","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/","https://github.com/FRRouting/frr/pull/13222/commits/cfd04dcb3e689754a72507d086ba3b9709fc5ed8","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/"],"published_time":"2023-09-05T07:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4750","summary":"Use After Free in GitHub repository vim/vim prior to 9.0.1857.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10396,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Oct/24","https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed","https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/","https://support.apple.com/kb/HT213984","http://seclists.org/fulldisclosure/2023/Oct/24","https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed","https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/","https://support.apple.com/kb/HT213984"],"published_time":"2023-09-04T14:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4752","summary":"Use After Free in GitHub repository vim/vim prior to 9.0.1858.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00057,"ranking_epss":0.17742,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Oct/24","https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139","https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757","https://lists.debian.org/debian-lts-announce/2023/09/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/","https://support.apple.com/kb/HT213984","http://seclists.org/fulldisclosure/2023/Oct/24","https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139","https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757","https://lists.debian.org/debian-lts-announce/2023/09/msg00035.html","https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/","https://support.apple.com/kb/HT213984"],"published_time":"2023-09-04T14:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4733","summary":"Use After Free in GitHub repository vim/vim prior to 9.0.1840.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.104,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Oct/24","https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c","https://huntr.dev/bounties/1ce1fd8c-050a-4373-8004-b35b61590217","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/","https://support.apple.com/kb/HT213984","http://seclists.org/fulldisclosure/2023/Oct/24","https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c","https://huntr.dev/bounties/1ce1fd8c-050a-4373-8004-b35b61590217","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/","https://support.apple.com/kb/HT213984"],"published_time":"2023-09-04T14:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36328","summary":"Integer Overflow vulnerability in mp_grow in libtom libtommath before commit beba892bc0d4e4ded4d667ab1d2a94f4d75109a9, allows attackers to execute arbitrary code and cause a denial of service (DoS).","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00561,"ranking_epss":0.68353,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/libtom/libtommath/pull/546","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3H2PFUTBKQUDSOJXQQS7LUSZQWT3JTW2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46GORAXZ34MHQNUGJBKS7PJ5NSMIAJGC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ZUPWZGPFJ4JOI2NIP7YLRKZD5YXQTBK/","https://github.com/libtom/libtommath/pull/546","https://lists.debian.org/debian-lts-announce/2024/09/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3H2PFUTBKQUDSOJXQQS7LUSZQWT3JTW2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46GORAXZ34MHQNUGJBKS7PJ5NSMIAJGC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ZUPWZGPFJ4JOI2NIP7YLRKZD5YXQTBK/"],"published_time":"2023-09-01T16:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40186","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an IntegerOverflow leading to Out-Of-Bound Write Vulnerability in the `gdi_CreateSurface` function. This issue affects FreeRDP based clients only. FreeRDP proxies are not affected as image decoding is not done by a proxy. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00105,"ranking_epss":0.28517,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/blob/fee2b10ba1154f952769a53eb608f044782e22f8/libfreerdp/gdi/gfx.c#L1156-L1165","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/blob/fee2b10ba1154f952769a53eb608f044782e22f8/libfreerdp/gdi/gfx.c#L1156-L1165","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T22:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40188","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `general_LumaToYUV444` function. This Out-Of-Bounds Read occurs because processing is done on the `in` variable without checking if it contains data of sufficient length. Insufficient data for the `in` variable may cause errors or crashes. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00103,"ranking_epss":0.28254,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/nsc.c#L115-L175","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/nsc.c#L115-L175","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T22:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40567","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `clear_decompress_bands_data` function in which there is no offset validation. Abuse of this vulnerability may lead to an out of bounds write. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0025,"ranking_epss":0.48291,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L612-L618","https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L843-L845","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L612-L618","https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L843-L845","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T22:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40569","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00105,"ranking_epss":0.28517,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/progressive.c#L2598-L2616","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/progressive.c#L2598-L2616","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T22:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40181","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer-Underflow leading to Out-Of-Bound Read in the `zgfx_decompress_segment` function. In the context of `CopyMemory`, it's possible to read data beyond the transmitted packet range and likely cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00246,"ranking_epss":0.47952,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L256-L261","https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L334-L355","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L256-L261","https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L334-L355","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39353","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to a missing offset validation leading to Out Of Bound Read. In the `libfreerdp/codec/rfx.c` file there is no offset validation in `tile->quantIdxY`, `tile->quantIdxCb`, and `tile->quantIdxCr`. As a result crafted input can lead to an out of bounds read access which in turn will cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00103,"ranking_epss":0.28254,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/codec/rfx.c#L994-L996","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/codec/rfx.c#L994-L996","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39356","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a missing offset validation may lead to an Out Of Bound Read in the function `gdi_multi_opaque_rect`. In particular there is no code to validate if the value `multi_opaque_rect->numRectangles` is less than 45. Looping through `multi_opaque_rect->`numRectangles without proper boundary checks can lead to Out-of-Bounds Read errors which will likely lead to a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00181,"ranking_epss":0.39832,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/include/freerdp/primary.h#L186-L196","https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/core/orders.c#L1503-L1504","https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gdi.c#L723C1-L758","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/include/freerdp/primary.h#L186-L196","https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/core/orders.c#L1503-L1504","https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gdi.c#L723C1-L758","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39352","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an invalid offset validation leading to Out Of Bound Write. This can be triggered when the values `rect->left` and `rect->top` are exactly equal to `surface->width` and  `surface->height`. eg. `rect->left` == `surface->width` && `rect->top` == `surface->height`. In practice this should cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00191,"ranking_epss":0.41005,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gfx.c#L1219-L1239","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gfx.c#L1219-L1239","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T21:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39350","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. This issue affects Clients only. Integer underflow leading to DOS (e.g. abort due to `WINPR_ASSERT` with default compilation flags). When an insufficient blockLen is provided, and proper length validation is not performed, an Integer Underflow occurs, leading to a Denial of Service (DOS) vulnerability. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00378,"ranking_epss":0.59391,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/e204fc8be5a372626b13f66daf2abafe71dbc2dc","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/commit/e204fc8be5a372626b13f66daf2abafe71dbc2dc","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39351","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of FreeRDP are subject to a Null Pointer Dereference leading a crash in the RemoteFX (rfx) handling.  Inside the `rfx_process_message_tileset` function, the program allocates tiles using `rfx_allocate_tiles` for the number of numTiles. If the initialization process of tiles is not completed for various reasons, tiles will have a NULL pointer. Which may be accessed in further processing and would cause a program crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0015,"ranking_epss":0.35589,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39354","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `nsc_rle_decompress_data` function. The Out-Of-Bounds Read occurs because it processes `context->Planes` without  checking if it contains data of sufficient length. Should an attacker be able to leverage this vulnerability they may be able to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00293,"ranking_epss":0.52722,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/cd1da25a87358eb3b5512fd259310e95b19a05ec","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/commit/cd1da25a87358eb3b5512fd259310e95b19a05ec","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40589","summary":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions there is a Global-Buffer-Overflow in the ncrush_decompress function. Feeding crafted input into this function can trigger the overflow which has only been shown to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0022,"ranking_epss":0.44702,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/16141a30f983dd6f7a6e5b0356084171942c9416","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/commit/16141a30f983dd6f7a6e5b0356084171942c9416","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x","https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2023-08-31T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-20900","summary":"A malicious actor that has been granted  Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged  Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00595,"ranking_epss":0.69353,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/08/31/1","http://www.openwall.com/lists/oss-security/2023/10/27/1","https://lists.debian.org/debian-lts-announce/2023/10/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVKQ6Y2JFJRWPFOZUOTFO3H27BK5GGOG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJNJMD67QIT6LXLKWSHFM47DCLRSMT6W/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJM6HDRQYS74JA7YNKQBFH2XSZ52HEWH/","https://security.netapp.com/advisory/ntap-20231013-0002/","https://www.debian.org/security/2023/dsa-5493","https://www.vmware.com/security/advisories/VMSA-2023-0019.html","http://www.openwall.com/lists/oss-security/2023/08/31/1","http://www.openwall.com/lists/oss-security/2023/10/27/1","https://lists.debian.org/debian-lts-announce/2023/10/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVKQ6Y2JFJRWPFOZUOTFO3H27BK5GGOG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJNJMD67QIT6LXLKWSHFM47DCLRSMT6W/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJM6HDRQYS74JA7YNKQBFH2XSZ52HEWH/","https://security.netapp.com/advisory/ntap-20231013-0002/","https://www.debian.org/security/2023/dsa-5493","https://www.vmware.com/security/advisories/VMSA-2023-0019.html"],"published_time":"2023-08-31T10:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4572","summary":"Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00328,"ranking_epss":0.55737,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_29.html","https://crbug.com/1472492","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5487","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_29.html","https://crbug.com/1472492","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5487"],"published_time":"2023-08-29T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38802","summary":"FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation).","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00944,"ranking_epss":0.76349,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/","https://news.ycombinator.com/item?id=37305800","https://www.debian.org/security/2023/dsa-5495","https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/","https://news.ycombinator.com/item?id=37305800","https://www.debian.org/security/2023/dsa-5495"],"published_time":"2023-08-29T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41358","summary":"An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00404,"ranking_epss":0.61031,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FRRouting/frr/pull/14260","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/","https://www.debian.org/security/2023/dsa-5495","https://github.com/FRRouting/frr/pull/14260","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/","https://www.debian.org/security/2023/dsa-5495"],"published_time":"2023-08-29T04:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41359","summary":"An issue was discovered in FRRouting FRR through 9.0. There is an out-of-bounds read in bgp_attr_aigp_valid in bgpd/bgp_attr.c because there is no check for the availability of two bytes during AIGP validation.","cvss":9.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.1,"cvss_v4":null,"epss":0.00187,"ranking_epss":0.4054,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FRRouting/frr/pull/14232","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/","https://github.com/FRRouting/frr/pull/14232","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/"],"published_time":"2023-08-29T04:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41360","summary":"An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.","cvss":9.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.1,"cvss_v4":null,"epss":0.00282,"ranking_epss":0.51623,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FRRouting/frr/pull/14245","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/","https://github.com/FRRouting/frr/pull/14245","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/"],"published_time":"2023-08-29T04:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-40587","summary":"Pyramid is an open source Python web framework. A path traversal vulnerability in Pyramid versions 2.0.0 and 2.0.1 impacts users of Python 3.11 that are using a Pyramid static view with a full filesystem path and have a `index.html` file that is located exactly one directory above the location of the static view's file system path. No further path traversal exists, and the only file that could be disclosed accidentally is `index.html`. Pyramid version 2.0.2 rejects any path that contains a null-byte out of caution. While valid in directory/file names, we would strongly consider it a mistake to use null-bytes in naming files/directories. Secondly, Python 3.11, and 3.12 has fixed the underlying issue in `os.path.normpath` to no longer truncate on the first `0x00` found, returning the behavior to pre-3.11 Python, un an as of yet unreleased version. Fixes will be available in:Python 3.12.0rc2 and 3.11.5. Some workarounds are available. Use a version of Python 3 that is not affected, downgrade to Python 3.10 series temporarily, or wait until Python 3.11.5 is released and upgrade to the latest version of Python 3.11 series.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0033,"ranking_epss":0.56043,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Pylons/pyramid/commit/347d7750da6f45c7436dd0c31468885cc9343c85","https://github.com/Pylons/pyramid/security/advisories/GHSA-j8g2-6fc7-q8f8","https://github.com/python/cpython/issues/106242","https://github.com/python/cpython/pull/106816","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYSDTQ7NP5GHPQ7HBE47MBJQK7YEIYMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQIPHQTM3XE5NIEXCTQFV2J2RK2YUSMT/","https://github.com/Pylons/pyramid/commit/347d7750da6f45c7436dd0c31468885cc9343c85","https://github.com/Pylons/pyramid/security/advisories/GHSA-j8g2-6fc7-q8f8","https://github.com/python/cpython/issues/106242","https://github.com/python/cpython/pull/106816","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYSDTQ7NP5GHPQ7HBE47MBJQK7YEIYMF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQIPHQTM3XE5NIEXCTQFV2J2RK2YUSMT/"],"published_time":"2023-08-25T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38201","summary":"A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06146,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:5080","https://access.redhat.com/security/cve/CVE-2023-38201","https://bugzilla.redhat.com/show_bug.cgi?id=2222693","https://github.com/keylime/keylime/commit/9e5ac9f25cd400b16d5969f531cee28290543f2a","https://github.com/keylime/keylime/security/advisories/GHSA-f4r5-q63f-gcww","https://access.redhat.com/errata/RHSA-2023:5080","https://access.redhat.com/security/cve/CVE-2023-38201","https://bugzilla.redhat.com/show_bug.cgi?id=2222693","https://github.com/keylime/keylime/commit/9e5ac9f25cd400b16d5969f531cee28290543f2a","https://github.com/keylime/keylime/security/advisories/GHSA-f4r5-q63f-gcww","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZIZZB5NHNCS5D2AEH3ZAO6OQC72IK7WS/"],"published_time":"2023-08-25T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3899","summary":"A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09763,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:4701","https://access.redhat.com/errata/RHSA-2023:4702","https://access.redhat.com/errata/RHSA-2023:4703","https://access.redhat.com/errata/RHSA-2023:4704","https://access.redhat.com/errata/RHSA-2023:4705","https://access.redhat.com/errata/RHSA-2023:4706","https://access.redhat.com/errata/RHSA-2023:4707","https://access.redhat.com/errata/RHSA-2023:4708","https://access.redhat.com/security/cve/CVE-2023-3899","https://bugzilla.redhat.com/show_bug.cgi?id=2225407","https://access.redhat.com/errata/RHSA-2023:4701","https://access.redhat.com/errata/RHSA-2023:4702","https://access.redhat.com/errata/RHSA-2023:4703","https://access.redhat.com/errata/RHSA-2023:4704","https://access.redhat.com/errata/RHSA-2023:4705","https://access.redhat.com/errata/RHSA-2023:4706","https://access.redhat.com/errata/RHSA-2023:4707","https://access.redhat.com/errata/RHSA-2023:4708","https://access.redhat.com/security/cve/CVE-2023-3899","https://bugzilla.redhat.com/show_bug.cgi?id=2225407","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJHKSBBZRDFOBNDU35FUKMYQIQYT6UJQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDIHGNLS3TZVX7X2F735OKI4KXPY4AH6/"],"published_time":"2023-08-23T11:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4427","summary":"Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.79336,"ranking_epss":0.99079,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/174951/Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html","https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html","https://crbug.com/1470668","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5483","http://packetstormsecurity.com/files/174951/Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html","https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html","https://crbug.com/1470668","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5483"],"published_time":"2023-08-23T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4428","summary":"Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.10929,"ranking_epss":0.93425,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html","https://crbug.com/1470477","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5483","https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html","https://crbug.com/1470477","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5483"],"published_time":"2023-08-23T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4429","summary":"Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00369,"ranking_epss":0.58842,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html","https://crbug.com/1469754","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5483","https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html","https://crbug.com/1469754","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5483"],"published_time":"2023-08-23T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4430","summary":"Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13133,"ranking_epss":0.94141,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html","https://crbug.com/1469542","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5483","https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html","https://crbug.com/1469542","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5483"],"published_time":"2023-08-23T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4431","summary":"Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00152,"ranking_epss":0.3589,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html","https://crbug.com/1469348","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5483","https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html","https://crbug.com/1469348","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5483"],"published_time":"2023-08-23T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-48065","summary":"GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00019,"ranking_epss":0.05138,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/","https://security.netapp.com/advisory/ntap-20231006-0008/","https://sourceware.org/bugzilla/show_bug.cgi?id=29925","https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d28fbc7197ba0e021a43f873eff90b05dcdcff6a","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/","https://security.netapp.com/advisory/ntap-20231006-0008/","https://sourceware.org/bugzilla/show_bug.cgi?id=29925","https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d28fbc7197ba0e021a43f873eff90b05dcdcff6a"],"published_time":"2023-08-22T19:16:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-48541","summary":"A memory leak in ImageMagick 7.0.10-45 and 6.9.11-22 allows remote attackers to perform a denial of service via the \"identify -help\" command.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00697,"ranking_epss":0.71969,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/ImageMagick/ImageMagick/issues/2889","https://lists.debian.org/debian-lts-announce/2024/03/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LICYTADFJAFPZW3Y2MKNCJIUYODPAG4L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YAULDP3GG5KI3XITQ5XSMRSILCBZS2VK/","https://github.com/ImageMagick/ImageMagick/issues/2889","https://lists.debian.org/debian-lts-announce/2024/03/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LICYTADFJAFPZW3Y2MKNCJIUYODPAG4L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YAULDP3GG5KI3XITQ5XSMRSILCBZS2VK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LICYTADFJAFPZW3Y2MKNCJIUYODPAG4L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAULDP3GG5KI3XITQ5XSMRSILCBZS2VK/"],"published_time":"2023-08-22T19:16:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-48064","summary":"GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":9e-05,"ranking_epss":0.00883,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/","https://security.netapp.com/advisory/ntap-20231006-0008/","https://sourceware.org/bugzilla/show_bug.cgi?id=29922","https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/","https://security.netapp.com/advisory/ntap-20231006-0008/","https://sourceware.org/bugzilla/show_bug.cgi?id=29922","https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931"],"published_time":"2023-08-22T19:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-29390","summary":"libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00066,"ranking_epss":0.2034,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=1943797","https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595","https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","https://bugzilla.redhat.com/show_bug.cgi?id=1943797","https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595","https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/"],"published_time":"2023-08-22T19:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-20197","summary":"A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.\r\n\r For a description of this vulnerability, see the ClamAV blog .","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00438,"ranking_epss":0.63167,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee","https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee"],"published_time":"2023-08-16T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4363","summary":"Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00256,"ranking_epss":0.49042,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1367085","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1367085","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4364","summary":"Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.57112,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1406922","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1406922","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4365","summary":"Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.57112,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1431043","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1431043","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4366","summary":"Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00133,"ranking_epss":0.32923,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1450784","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1450784","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4367","summary":"Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.20888,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1467743","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1467743","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4356","summary":"Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00962,"ranking_epss":0.76556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1449929","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1449929","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4357","summary":"Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.57479,"ranking_epss":0.98166,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1458911","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1458911","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4358","summary":"Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00962,"ranking_epss":0.76556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1466415","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1466415","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4359","summary":"Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00237,"ranking_epss":0.46832,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1443722","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1443722","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4360","summary":"Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.57112,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1462723","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1462723","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4361","summary":"Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16727,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1465230","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1465230","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4350","summary":"Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00322,"ranking_epss":0.5531,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1454817","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1454817","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4351","summary":"Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00717,"ranking_epss":0.72434,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1465833","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1465833","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4352","summary":"Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01414,"ranking_epss":0.80576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/174669/Chrome-Read-Only-Property-Overwrite.html","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1452076","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","http://packetstormsecurity.com/files/174669/Chrome-Read-Only-Property-Overwrite.html","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1452076","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4353","summary":"Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01372,"ranking_epss":0.8026,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1458046","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1458046","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4354","summary":"Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01969,"ranking_epss":0.83568,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/174949/Chrome-SKIA-Integer-Overflow.html","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1464215","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","http://packetstormsecurity.com/files/174949/Chrome-SKIA-Integer-Overflow.html","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1464215","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4355","summary":"Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.39284,"ranking_epss":0.97298,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/174950/Chrome-Dangling-FixedArray-Pointers-Memory-Corruption.html","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1468943","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","http://packetstormsecurity.com/files/174950/Chrome-Dangling-FixedArray-Pointers-Memory-Corruption.html","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1468943","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4349","summary":"Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00962,"ranking_epss":0.76556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1458303","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html","https://crbug.com/1458303","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5479"],"published_time":"2023-08-15T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32004","summary":"A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of Buffers in file system APIs causing a traversal path to bypass when verifying file permissions.\n\nThis vulnerability affects all users using the experimental permission model in Node.js 20.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.30647,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/2038134","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQPELKG2LVTADSB7ME73AV4DXQK47PWK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX/","https://security.netapp.com/advisory/ntap-20230915-0009/","https://hackerone.com/reports/2038134","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQPELKG2LVTADSB7ME73AV4DXQK47PWK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX/","https://security.netapp.com/advisory/ntap-20230915-0009/"],"published_time":"2023-08-15T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32006","summary":"The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22337,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/2043807","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQPELKG2LVTADSB7ME73AV4DXQK47PWK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX/","https://security.netapp.com/advisory/ntap-20230915-0009/","https://hackerone.com/reports/2043807","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQPELKG2LVTADSB7ME73AV4DXQK47PWK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX/","https://security.netapp.com/advisory/ntap-20230915-0009/"],"published_time":"2023-08-15T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32003","summary":"`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory.\n\nThis vulnerability affects all users using the experimental permission model in Node.js 20.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00063,"ranking_epss":0.19685,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/2037887","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQPELKG2LVTADSB7ME73AV4DXQK47PWK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX/","https://security.netapp.com/advisory/ntap-20230915-0009/","https://hackerone.com/reports/2037887","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQPELKG2LVTADSB7ME73AV4DXQK47PWK/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX/","https://security.netapp.com/advisory/ntap-20230915-0009/"],"published_time":"2023-08-15T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4322","summary":"Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00243,"ranking_epss":0.47656,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/radareorg/radare2/commit/ba919adb74ac368bf76b150a00347ded78b572dd","https://huntr.dev/bounties/06e2484c-d6f1-4497-af67-26549be9fffd","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/64KUV6OGEVQ75QOV35PUVVDOJTKSJHYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOZ6XCADVAPAIHMVSV3FUAN742BHXF55/","https://github.com/radareorg/radare2/commit/ba919adb74ac368bf76b150a00347ded78b572dd","https://huntr.dev/bounties/06e2484c-d6f1-4497-af67-26549be9fffd","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/64KUV6OGEVQ75QOV35PUVVDOJTKSJHYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOZ6XCADVAPAIHMVSV3FUAN742BHXF55/"],"published_time":"2023-08-14T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3824","summary":"In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.","cvss":9.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.4,"cvss_v4":null,"epss":0.32366,"ranking_epss":0.96853,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv","https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/","https://security.netapp.com/advisory/ntap-20230825-0001/","https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv","https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/","https://security.netapp.com/advisory/ntap-20230825-0001/"],"published_time":"2023-08-11T06:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3823","summary":"In PHP versions 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8 various XML functions rely on libxml global state to track configuration variables, like whether external entities are loaded. This state is assumed to be unchanged unless the user explicitly changes it by calling appropriate function. However, since the state is process-global, other modules - such as ImageMagick - may also use this library within the same process, and change that global state for their internal purposes, and leave it in a state where external entities loading is enabled. This can lead to the situation where external XML is parsed with external entities loaded, which can lead to disclosure of any local files accessible to PHP. This vulnerable state may persist in the same process across many requests, until the process is shut down.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00343,"ranking_epss":0.56994,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/php/php-src/security/advisories/GHSA-3qrf-m4j2-pcrr","https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/","https://security.netapp.com/advisory/ntap-20230825-0001/","https://github.com/php/php-src/security/advisories/GHSA-3qrf-m4j2-pcrr","https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/","https://security.netapp.com/advisory/ntap-20230825-0001/"],"published_time":"2023-08-11T06:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-23908","summary":"Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.","cvss":6.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02028,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/","https://security.netapp.com/advisory/ntap-20230824-0003/","https://www.debian.org/security/2023/dsa-5474","http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/","https://security.netapp.com/advisory/ntap-20230824-0003/","https://www.debian.org/security/2023/dsa-5474"],"published_time":"2023-08-11T03:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22840","summary":"Improper neutralization in software for the Intel(R) oneVPL GPU software before version 22.6.5 may allow an authenticated user to potentially enable denial of service via local access.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18452,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00818.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/","http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00818.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/"],"published_time":"2023-08-11T03:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46329","summary":"Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.","cvss":8.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08848,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/","http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"],"published_time":"2023-08-11T03:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22338","summary":"Out-of-bounds read in some Intel(R) oneVPL GPU software before version 22.6.5 may allow an authenticated user to potentially enable information disclosure via local access.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00818.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/","http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00818.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/"],"published_time":"2023-08-11T03:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41804","summary":"Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.03953,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/","https://security.netapp.com/advisory/ntap-20230915-0003/","https://www.debian.org/security/2023/dsa-5474","http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/","https://security.netapp.com/advisory/ntap-20230915-0003/","https://www.debian.org/security/2023/dsa-5474"],"published_time":"2023-08-11T03:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-40964","summary":"Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.","cvss":7.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.9,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08488,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/","http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"],"published_time":"2023-08-11T03:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38076","summary":"Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.","cvss":3.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.8,"cvss_v4":null,"epss":0.00088,"ranking_epss":0.25079,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/","http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"],"published_time":"2023-08-11T03:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-36351","summary":"Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24727,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/","http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"],"published_time":"2023-08-11T03:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-27635","summary":"Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.","cvss":8.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08817,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/","http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html","https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"],"published_time":"2023-08-11T03:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4273","summary":"A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.","cvss":6.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00066,"ranking_epss":0.20302,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/security/cve/CVE-2023-4273","https://bugzilla.redhat.com/show_bug.cgi?id=2221609","https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/","https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/security/cve/CVE-2023-4273","https://bugzilla.redhat.com/show_bug.cgi?id=2221609","https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/","https://security.netapp.com/advisory/ntap-20231027-0002/","https://www.debian.org/security/2023/dsa-5480","https://www.debian.org/security/2023/dsa-5492"],"published_time":"2023-08-09T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38180","summary":".NET and Visual Studio Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00882,"ranking_epss":0.75425,"kev":true,"propose_action":"Microsoft .NET Core and Visual Studio contain an unspecified vulnerability that allows for denial-of-service (DoS).","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-38180"],"published_time":"2023-08-08T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-20569","summary":"\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00633,"ranking_epss":0.70398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/08/08/4","http://xenbits.xen.org/xsa/advisory-434.html","https://comsec.ethz.ch/research/microarch/inception/","https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/","https://security.netapp.com/advisory/ntap-20240605-0006/","https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005","https://www.debian.org/security/2023/dsa-5475","http://www.openwall.com/lists/oss-security/2023/08/08/4","http://xenbits.xen.org/xsa/advisory-434.html","https://comsec.ethz.ch/research/microarch/inception/","https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/","https://security.netapp.com/advisory/ntap-20240605-0006/","https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005","https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html","https://www.debian.org/security/2023/dsa-5475"],"published_time":"2023-08-08T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-20588","summary":"\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.07781,"ranking_epss":0.9198,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/09/25/3","http://www.openwall.com/lists/oss-security/2023/09/25/4","http://www.openwall.com/lists/oss-security/2023/09/25/5","http://www.openwall.com/lists/oss-security/2023/09/25/7","http://www.openwall.com/lists/oss-security/2023/09/25/8","http://www.openwall.com/lists/oss-security/2023/09/26/5","http://www.openwall.com/lists/oss-security/2023/09/26/8","http://www.openwall.com/lists/oss-security/2023/09/26/9","http://www.openwall.com/lists/oss-security/2023/09/27/1","http://www.openwall.com/lists/oss-security/2023/10/03/12","http://www.openwall.com/lists/oss-security/2023/10/03/13","http://www.openwall.com/lists/oss-security/2023/10/03/14","http://www.openwall.com/lists/oss-security/2023/10/03/15","http://www.openwall.com/lists/oss-security/2023/10/03/16","http://www.openwall.com/lists/oss-security/2023/10/03/9","http://www.openwall.com/lists/oss-security/2023/10/04/1","http://www.openwall.com/lists/oss-security/2023/10/04/2","http://www.openwall.com/lists/oss-security/2023/10/04/3","http://www.openwall.com/lists/oss-security/2023/10/04/4","http://xenbits.xen.org/xsa/advisory-439.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/","https://security.netapp.com/advisory/ntap-20240531-0005/","https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007","https://www.debian.org/security/2023/dsa-5480","https://www.debian.org/security/2023/dsa-5492","http://www.openwall.com/lists/oss-security/2023/09/25/3","http://www.openwall.com/lists/oss-security/2023/09/25/4","http://www.openwall.com/lists/oss-security/2023/09/25/5","http://www.openwall.com/lists/oss-security/2023/09/25/7","http://www.openwall.com/lists/oss-security/2023/09/25/8","http://www.openwall.com/lists/oss-security/2023/09/26/5","http://www.openwall.com/lists/oss-security/2023/09/26/8","http://www.openwall.com/lists/oss-security/2023/09/26/9","http://www.openwall.com/lists/oss-security/2023/09/27/1","http://www.openwall.com/lists/oss-security/2023/10/03/12","http://www.openwall.com/lists/oss-security/2023/10/03/13","http://www.openwall.com/lists/oss-security/2023/10/03/14","http://www.openwall.com/lists/oss-security/2023/10/03/15","http://www.openwall.com/lists/oss-security/2023/10/03/16","http://www.openwall.com/lists/oss-security/2023/10/03/9","http://www.openwall.com/lists/oss-security/2023/10/04/1","http://www.openwall.com/lists/oss-security/2023/10/04/2","http://www.openwall.com/lists/oss-security/2023/10/04/3","http://www.openwall.com/lists/oss-security/2023/10/04/4","http://xenbits.xen.org/xsa/advisory-439.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/","https://security.netapp.com/advisory/ntap-20240531-0005/","https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007","https://www.debian.org/security/2023/dsa-5480","https://www.debian.org/security/2023/dsa-5492"],"published_time":"2023-08-08T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-39978","summary":"ImageMagick before 6.9.12-91 allows attackers to cause a denial of service (memory consumption) in Magick::Draw.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.1009,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/ImageMagick/ImageMagick6/commit/c90e79b3b22fec309cab55af2ee606f71b027b12","https://github.com/ImageMagick/ImageMagick6/compare/6.9.12-90...6.9.12-91","https://github.com/rmagick/rmagick/pull/1406/files","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/","https://github.com/ImageMagick/ImageMagick6/commit/c90e79b3b22fec309cab55af2ee606f71b027b12","https://github.com/ImageMagick/ImageMagick6/compare/6.9.12-90...6.9.12-91","https://github.com/rmagick/rmagick/pull/1406/files","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/"],"published_time":"2023-08-08T06:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4147","summary":"A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00161,"ranking_epss":0.37009,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:5069","https://access.redhat.com/errata/RHSA-2023:5091","https://access.redhat.com/errata/RHSA-2023:5093","https://access.redhat.com/errata/RHSA-2023:7382","https://access.redhat.com/errata/RHSA-2023:7389","https://access.redhat.com/errata/RHSA-2023:7411","https://access.redhat.com/security/cve/CVE-2023-4147","https://bugzilla.redhat.com/show_bug.cgi?id=2225239","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211","https://www.spinics.net/lists/stable/msg671573.html","https://access.redhat.com/errata/RHSA-2023:5069","https://access.redhat.com/errata/RHSA-2023:5091","https://access.redhat.com/errata/RHSA-2023:5093","https://access.redhat.com/errata/RHSA-2023:7382","https://access.redhat.com/errata/RHSA-2023:7389","https://access.redhat.com/errata/RHSA-2023:7411","https://access.redhat.com/security/cve/CVE-2023-4147","https://bugzilla.redhat.com/show_bug.cgi?id=2225239","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://security.netapp.com/advisory/ntap-20231020-0006/","https://www.debian.org/security/2023/dsa-5480","https://www.debian.org/security/2023/dsa-5492","https://www.spinics.net/lists/stable/msg671573.html"],"published_time":"2023-08-07T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4194","summary":"A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode->i_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":6e-05,"ranking_epss":0.00282,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/security/cve/CVE-2023-4194","https://bugzilla.redhat.com/show_bug.cgi?id=2229498","https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/","https://lore.kernel.org/all/20230731164237.48365-2-lersek@redhat.com/","https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/","https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/security/cve/CVE-2023-4194","https://bugzilla.redhat.com/show_bug.cgi?id=2229498","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/","https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/","https://lore.kernel.org/all/20230731164237.48365-2-lersek@redhat.com/","https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/","https://security.netapp.com/advisory/ntap-20231027-0002/","https://www.debian.org/security/2023/dsa-5480","https://www.debian.org/security/2023/dsa-5492"],"published_time":"2023-08-07T14:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38497","summary":"Cargo downloads the Rust project’s dependencies and compiles the project. Cargo prior to version 0.72.2, bundled with Rust prior to version 1.71.1, did not respect the umask when extracting crate archives on UNIX-like systems. If the user downloaded a crate containing files writeable by any local user, another local user could exploit this to change the source code compiled and executed by the current user. To prevent existing cached extractions from being exploitable, the Cargo binary version 0.72.2 included in Rust 1.71.1 or later will purge caches generated by older Cargo versions automatically. As a workaround, configure one's system to prevent other local users from accessing the Cargo directory, usually located in `~/.cargo`.","cvss":7.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.9,"cvss_v4":null,"epss":0.05657,"ranking_epss":0.90385,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://en.wikipedia.org/wiki/Umask","https://github.com/rust-lang/cargo/commit/d78bbf4bde3c6b95caca7512f537c6f9721426ff","https://github.com/rust-lang/cargo/pull/12443","https://github.com/rust-lang/cargo/security/advisories/GHSA-j3xp-wfr4-hx87","https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGKE6PGM4HIQUHPJRBQAHMELINSGN4H4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMEXGUGPW5OBSQA6URTBNDSU3RAEFOZ4/","https://www.rust-lang.org/policies/security","https://en.wikipedia.org/wiki/Umask","https://github.com/rust-lang/cargo/commit/d78bbf4bde3c6b95caca7512f537c6f9721426ff","https://github.com/rust-lang/cargo/pull/12443","https://github.com/rust-lang/cargo/security/advisories/GHSA-j3xp-wfr4-hx87","https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGKE6PGM4HIQUHPJRBQAHMELINSGN4H4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMEXGUGPW5OBSQA6URTBNDSU3RAEFOZ4/","https://www.rust-lang.org/policies/security"],"published_time":"2023-08-04T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4135","summary":"A heap out-of-bounds memory read flaw was found in the virtual nvme device in QEMU. The QEMU process does not validate an offset provided by the guest before computing a host heap pointer, which is used for copying data back to the guest. Arbitrary heap memory relative to an allocated buffer can be disclosed.","cvss":6.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05735,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-4135","https://bugzilla.redhat.com/show_bug.cgi?id=2229101","https://security.netapp.com/advisory/ntap-20230915-0012/","https://www.zerodayinitiative.com/advisories/ZDI-CAN-21521","https://access.redhat.com/security/cve/CVE-2023-4135","https://bugzilla.redhat.com/show_bug.cgi?id=2229101","https://security.netapp.com/advisory/ntap-20230915-0012/","https://www.zerodayinitiative.com/advisories/ZDI-CAN-21521"],"published_time":"2023-08-04T14:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4133","summary":"A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of service condition.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00011,"ranking_epss":0.01302,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-4133","https://bugzilla.redhat.com/show_bug.cgi?id=2221702","https://access.redhat.com/errata/RHSA-2024:2394","https://access.redhat.com/errata/RHSA-2024:2950","https://access.redhat.com/errata/RHSA-2024:3138","https://access.redhat.com/security/cve/CVE-2023-4133","https://bugzilla.redhat.com/show_bug.cgi?id=2221702"],"published_time":"2023-08-03T15:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4132","summary":"A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00011,"ranking_epss":0.01447,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6901","https://access.redhat.com/errata/RHSA-2023:7077","https://access.redhat.com/errata/RHSA-2024:0575","https://access.redhat.com/errata/RHSA-2024:0724","https://access.redhat.com/security/cve/CVE-2023-4132","https://bugzilla.redhat.com/show_bug.cgi?id=2221707","https://access.redhat.com/errata/RHSA-2023:6901","https://access.redhat.com/errata/RHSA-2023:7077","https://access.redhat.com/errata/RHSA-2024:0575","https://access.redhat.com/errata/RHSA-2024:0724","https://access.redhat.com/security/cve/CVE-2023-4132","https://bugzilla.redhat.com/show_bug.cgi?id=2221707","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://security.netapp.com/advisory/ntap-20231020-0005/","https://www.debian.org/security/2023/dsa-5480","https://www.debian.org/security/2023/dsa-5492"],"published_time":"2023-08-03T15:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3180","summary":"A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.","cvss":6.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02292,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-3180","https://bugzilla.redhat.com/show_bug.cgi?id=2222424","https://lists.debian.org/debian-lts-announce/2023/10/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/","https://security.netapp.com/advisory/ntap-20230831-0008/","https://access.redhat.com/security/cve/CVE-2023-3180","https://bugzilla.redhat.com/show_bug.cgi?id=2222424","https://lists.debian.org/debian-lts-announce/2023/10/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/","https://security.netapp.com/advisory/ntap-20230831-0008/"],"published_time":"2023-08-03T15:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4073","summary":"Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00702,"ranking_epss":0.7209,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html","https://crbug.com/1456243","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5467","https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html","https://crbug.com/1456243","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202312-07","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5467"],"published_time":"2023-08-03T01:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29407","summary":"A maliciously-crafted image can cause excessive CPU consumption in decoding. A tiled image with a height of 0 and a very large width can cause excessive CPU consumption, despite the image size (width * height) appearing to be zero.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00241,"ranking_epss":0.47383,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://go.dev/cl/514897","https://go.dev/issue/61581","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/","https://pkg.go.dev/vuln/GO-2023-1990","https://security.netapp.com/advisory/ntap-20230831-0009/","https://go.dev/cl/514897","https://go.dev/issue/61581","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/","https://pkg.go.dev/vuln/GO-2023-1990","https://security.netapp.com/advisory/ntap-20230831-0009/"],"published_time":"2023-08-02T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29408","summary":"The TIFF decoder does not place a limit on the size of compressed tile data. A maliciously-crafted image can exploit this to cause a small image (both in terms of pixel width/height, and encoded size) to make the decoder decode large amounts of compressed data, consuming excessive memory and CPU.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00433,"ranking_epss":0.62765,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://go.dev/cl/514897","https://go.dev/issue/61582","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/","https://pkg.go.dev/vuln/GO-2023-1989","https://security.netapp.com/advisory/ntap-20230831-0009/","https://go.dev/cl/514897","https://go.dev/issue/61582","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/","https://pkg.go.dev/vuln/GO-2023-1989","https://security.netapp.com/advisory/ntap-20230831-0009/"],"published_time":"2023-08-02T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4016","summary":"Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.","cvss":2.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.5,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02226,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.com/procps-ng/procps","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUETRRT24OFGPYK6ACPM5VUGHNKH5CQ5/","https://gitlab.com/procps-ng/procps","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUETRRT24OFGPYK6ACPM5VUGHNKH5CQ5/"],"published_time":"2023-08-02T05:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38559","summary":"A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.01917,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6544","https://access.redhat.com/errata/RHSA-2023:7053","https://access.redhat.com/security/cve/CVE-2023-38559","https://bugs.ghostscript.com/show_bug.cgi?id=706897","https://bugzilla.redhat.com/show_bug.cgi?id=2224367","https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1","https://access.redhat.com/errata/RHSA-2023:6544","https://access.redhat.com/errata/RHSA-2023:7053","https://access.redhat.com/security/cve/CVE-2023-38559","https://bugs.ghostscript.com/show_bug.cgi?id=706897","https://bugzilla.redhat.com/show_bug.cgi?id=2224367","https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1","https://lists.debian.org/debian-lts-announce/2023/08/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/"],"published_time":"2023-08-01T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-4004","summary":"A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.03107,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:4961","https://access.redhat.com/errata/RHSA-2023:4962","https://access.redhat.com/errata/RHSA-2023:4967","https://access.redhat.com/errata/RHSA-2023:5069","https://access.redhat.com/errata/RHSA-2023:5091","https://access.redhat.com/errata/RHSA-2023:5093","https://access.redhat.com/errata/RHSA-2023:5221","https://access.redhat.com/errata/RHSA-2023:5244","https://access.redhat.com/errata/RHSA-2023:5255","https://access.redhat.com/errata/RHSA-2023:5548","https://access.redhat.com/errata/RHSA-2023:5627","https://access.redhat.com/errata/RHSA-2023:7382","https://access.redhat.com/errata/RHSA-2023:7389","https://access.redhat.com/errata/RHSA-2023:7411","https://access.redhat.com/errata/RHSA-2023:7417","https://access.redhat.com/errata/RHSA-2023:7431","https://access.redhat.com/errata/RHSA-2023:7434","https://access.redhat.com/security/cve/CVE-2023-4004","https://bugzilla.redhat.com/show_bug.cgi?id=2225275","https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230719190824.21196-1-fw@strlen.de/","http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html","http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html","https://access.redhat.com/errata/RHSA-2023:4961","https://access.redhat.com/errata/RHSA-2023:4962","https://access.redhat.com/errata/RHSA-2023:4967","https://access.redhat.com/errata/RHSA-2023:5069","https://access.redhat.com/errata/RHSA-2023:5091","https://access.redhat.com/errata/RHSA-2023:5093","https://access.redhat.com/errata/RHSA-2023:5221","https://access.redhat.com/errata/RHSA-2023:5244","https://access.redhat.com/errata/RHSA-2023:5255","https://access.redhat.com/errata/RHSA-2023:5548","https://access.redhat.com/errata/RHSA-2023:5627","https://access.redhat.com/errata/RHSA-2023:7382","https://access.redhat.com/errata/RHSA-2023:7389","https://access.redhat.com/errata/RHSA-2023:7411","https://access.redhat.com/errata/RHSA-2023:7417","https://access.redhat.com/errata/RHSA-2023:7431","https://access.redhat.com/errata/RHSA-2023:7434","https://access.redhat.com/security/cve/CVE-2023-4004","https://bugzilla.redhat.com/show_bug.cgi?id=2225275","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230719190824.21196-1-fw@strlen.de/","https://security.netapp.com/advisory/ntap-20231027-0001/","https://www.debian.org/security/2023/dsa-5480","https://www.debian.org/security/2023/dsa-5492"],"published_time":"2023-07-31T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4917","summary":"Incorrect security UI in Notifications in Google Chrome on Android prior to 103.0.5060.53 allowed a remote attacker to obscure the full screen notification via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0012,"ranking_epss":0.30958,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html","https://crbug.com/1311683","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/","https://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html","https://crbug.com/1311683","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/"],"published_time":"2023-07-29T00:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4926","summary":"Insufficient policy enforcement in Intents in Google Chrome on Android prior to 109.0.5414.119 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12397,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html","https://crbug.com/1368230","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/","https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html","https://crbug.com/1368230","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/"],"published_time":"2023-07-29T00:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4907","summary":"Uninitialized Use in FFmpeg in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01448,"ranking_epss":0.80793,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_29.html","https://crbug.com/1358168","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LE64KGGOISKPKMYROSDT4K6QFVDIRF6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ/","https://www.debian.org/security/2023/dsa-5552","https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_29.html","https://crbug.com/1358168","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LE64KGGOISKPKMYROSDT4K6QFVDIRF6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ/","https://www.debian.org/security/2023/dsa-5552"],"published_time":"2023-07-29T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-37920","summary":"Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \"e-Tugra\" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00112,"ranking_epss":0.29576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909","https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7","https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/","https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909","https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7","https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/","https://security.netapp.com/advisory/ntap-20240912-0002/"],"published_time":"2023-07-25T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3772","summary":"A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01465,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/errata/RHSA-2023:6901","https://access.redhat.com/errata/RHSA-2023:7077","https://access.redhat.com/errata/RHSA-2024:0412","https://access.redhat.com/errata/RHSA-2024:0575","https://access.redhat.com/security/cve/CVE-2023-3772","https://bugzilla.redhat.com/show_bug.cgi?id=2218943","http://www.openwall.com/lists/oss-security/2023/08/10/1","http://www.openwall.com/lists/oss-security/2023/08/10/3","https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/errata/RHSA-2023:6901","https://access.redhat.com/errata/RHSA-2023:7077","https://access.redhat.com/errata/RHSA-2024:0412","https://access.redhat.com/errata/RHSA-2024:0575","https://access.redhat.com/security/cve/CVE-2023-3772","https://bugzilla.redhat.com/show_bug.cgi?id=2218943","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","https://www.debian.org/security/2023/dsa-5492"],"published_time":"2023-07-25T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3773","summary":"A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.04203,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/security/cve/CVE-2023-3773","https://bugzilla.redhat.com/show_bug.cgi?id=2218944","https://access.redhat.com/errata/RHSA-2023:6583","https://access.redhat.com/security/cve/CVE-2023-3773","https://bugzilla.redhat.com/show_bug.cgi?id=2218944","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://www.debian.org/security/2023/dsa-5492"],"published_time":"2023-07-25T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38200","summary":"A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00245,"ranking_epss":0.47836,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:5080","https://access.redhat.com/security/cve/CVE-2023-38200","https://bugzilla.redhat.com/show_bug.cgi?id=2222692","https://github.com/keylime/keylime/pull/1421","https://access.redhat.com/errata/RHSA-2023:5080","https://access.redhat.com/security/cve/CVE-2023-38200","https://bugzilla.redhat.com/show_bug.cgi?id=2222692","https://github.com/keylime/keylime/pull/1421","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZIZZB5NHNCS5D2AEH3ZAO6OQC72IK7WS/"],"published_time":"2023-07-24T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1386","summary":"A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03542,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-1386","https://bugzilla.redhat.com/show_bug.cgi?id=2223985","https://github.com/advisories/GHSA-ppj8-867g-rgjr","https://github.com/v9fs/linux/issues/29","https://security.netapp.com/advisory/ntap-20230831-0005/","https://access.redhat.com/security/cve/CVE-2023-1386","https://bugzilla.redhat.com/show_bug.cgi?id=2223985","https://github.com/advisories/GHSA-ppj8-867g-rgjr","https://github.com/v9fs/linux/issues/29","https://security.netapp.com/advisory/ntap-20230831-0005/"],"published_time":"2023-07-24T16:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38633","summary":"A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=\".?../../../../../../../../../../etc/passwd\" in an xi:include element.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.43614,"ranking_epss":0.97529,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Jul/43","http://www.openwall.com/lists/oss-security/2023/07/27/1","http://www.openwall.com/lists/oss-security/2023/09/06/10","https://bugzilla.suse.com/show_bug.cgi?id=1213502","https://gitlab.gnome.org/GNOME/librsvg/-/issues/996","https://gitlab.gnome.org/GNOME/librsvg/-/releases/2.56.3","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/422NTIHIEBRASIG2DWXYBH4ADYMHY626/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5BCXT5GW6RCL45ZUHUZR4CJG2BAFDVC/","https://news.ycombinator.com/item?id=37415799","https://security.netapp.com/advisory/ntap-20230831-0011/","https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/","https://www.debian.org/security/2023/dsa-5484","http://seclists.org/fulldisclosure/2023/Jul/43","http://www.openwall.com/lists/oss-security/2023/07/27/1","http://www.openwall.com/lists/oss-security/2023/09/06/10","https://bugzilla.suse.com/show_bug.cgi?id=1213502","https://gitlab.gnome.org/GNOME/librsvg/-/issues/996","https://gitlab.gnome.org/GNOME/librsvg/-/releases/2.56.3","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/422NTIHIEBRASIG2DWXYBH4ADYMHY626/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5BCXT5GW6RCL45ZUHUZR4CJG2BAFDVC/","https://news.ycombinator.com/item?id=37415799","https://security.netapp.com/advisory/ntap-20230831-0011/","https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/","https://www.debian.org/security/2023/dsa-5484"],"published_time":"2023-07-22T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-2127","summary":"An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.01247,"ranking_epss":0.79329,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6667","https://access.redhat.com/errata/RHSA-2023:7139","https://access.redhat.com/errata/RHSA-2024:0423","https://access.redhat.com/errata/RHSA-2024:0580","https://access.redhat.com/security/cve/CVE-2022-2127","https://bugzilla.redhat.com/show_bug.cgi?id=2222791","https://www.samba.org/samba/security/CVE-2022-2127.html","https://access.redhat.com/errata/RHSA-2023:6667","https://access.redhat.com/errata/RHSA-2023:7139","https://access.redhat.com/errata/RHSA-2024:0423","https://access.redhat.com/errata/RHSA-2024:0580","https://access.redhat.com/security/cve/CVE-2022-2127","https://bugzilla.redhat.com/show_bug.cgi?id=2222791","https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/","https://security.netapp.com/advisory/ntap-20230731-0010/","https://www.debian.org/security/2023/dsa-5477","https://www.samba.org/samba/security/CVE-2022-2127.html"],"published_time":"2023-07-20T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34966","summary":"An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.15899,"ranking_epss":0.94764,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6667","https://access.redhat.com/errata/RHSA-2023:7139","https://access.redhat.com/errata/RHSA-2024:0423","https://access.redhat.com/errata/RHSA-2024:0580","https://access.redhat.com/errata/RHSA-2024:4101","https://access.redhat.com/security/cve/CVE-2023-34966","https://bugzilla.redhat.com/show_bug.cgi?id=2222793","https://www.samba.org/samba/security/CVE-2023-34966","https://access.redhat.com/errata/RHSA-2023:6667","https://access.redhat.com/errata/RHSA-2023:7139","https://access.redhat.com/errata/RHSA-2024:0423","https://access.redhat.com/errata/RHSA-2024:0580","https://access.redhat.com/errata/RHSA-2024:4101","https://access.redhat.com/security/cve/CVE-2023-34966","https://bugzilla.redhat.com/show_bug.cgi?id=2222793","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/","https://security.netapp.com/advisory/ntap-20230731-0010/","https://www.debian.org/security/2023/dsa-5477","https://www.samba.org/samba/security/CVE-2023-34966"],"published_time":"2023-07-20T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34967","summary":"A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.21174,"ranking_epss":0.95676,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6667","https://access.redhat.com/errata/RHSA-2023:7139","https://access.redhat.com/errata/RHSA-2024:0423","https://access.redhat.com/errata/RHSA-2024:0580","https://access.redhat.com/security/cve/CVE-2023-34967","https://bugzilla.redhat.com/show_bug.cgi?id=2222794","https://www.samba.org/samba/security/CVE-2023-34967.html","https://access.redhat.com/errata/RHSA-2023:6667","https://access.redhat.com/errata/RHSA-2023:7139","https://access.redhat.com/errata/RHSA-2024:0423","https://access.redhat.com/errata/RHSA-2024:0580","https://access.redhat.com/security/cve/CVE-2023-34967","https://bugzilla.redhat.com/show_bug.cgi?id=2222794","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/","https://security.netapp.com/advisory/ntap-20230731-0010/","https://www.debian.org/security/2023/dsa-5477","https://www.samba.org/samba/security/CVE-2023-34967.html"],"published_time":"2023-07-20T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34968","summary":"A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.02387,"ranking_epss":0.85033,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:6667","https://access.redhat.com/errata/RHSA-2023:7139","https://access.redhat.com/errata/RHSA-2024:0423","https://access.redhat.com/errata/RHSA-2024:0580","https://access.redhat.com/security/cve/CVE-2023-34968","https://bugzilla.redhat.com/show_bug.cgi?id=2222795","https://www.samba.org/samba/security/CVE-2023-34968.html","https://access.redhat.com/errata/RHSA-2023:6667","https://access.redhat.com/errata/RHSA-2023:7139","https://access.redhat.com/errata/RHSA-2024:0423","https://access.redhat.com/errata/RHSA-2024:0580","https://access.redhat.com/security/cve/CVE-2023-34968","https://bugzilla.redhat.com/show_bug.cgi?id=2222795","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/","https://security.netapp.com/advisory/ntap-20230731-0010/","https://www.debian.org/security/2023/dsa-5477","https://www.samba.org/samba/security/CVE-2023-34968.html"],"published_time":"2023-07-20T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3347","summary":"A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured \"server signing = required\" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00419,"ranking_epss":0.61925,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2023:4325","https://access.redhat.com/errata/RHSA-2023:4328","https://access.redhat.com/security/cve/CVE-2023-3347","https://bugzilla.redhat.com/show_bug.cgi?id=2222792","https://www.samba.org/samba/security/CVE-2023-3347.html","https://access.redhat.com/errata/RHSA-2023:4325","https://access.redhat.com/errata/RHSA-2023:4328","https://access.redhat.com/security/cve/CVE-2023-3347","https://bugzilla.redhat.com/show_bug.cgi?id=2222792","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/","https://security.netapp.com/advisory/ntap-20230731-0010/","https://www.debian.org/security/2023/dsa-5477","https://www.samba.org/samba/security/CVE-2023-3347.html"],"published_time":"2023-07-20T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38408","summary":"The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.64352,"ranking_epss":0.98452,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html","http://www.openwall.com/lists/oss-security/2023/07/20/1","http://www.openwall.com/lists/oss-security/2023/07/20/2","http://www.openwall.com/lists/oss-security/2023/09/22/11","http://www.openwall.com/lists/oss-security/2023/09/22/9","https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent","https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8","https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d","https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca","https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/","https://news.ycombinator.com/item?id=36790196","https://security.gentoo.org/glsa/202307-01","https://security.netapp.com/advisory/ntap-20230803-0010/","https://support.apple.com/kb/HT213940","https://www.openssh.com/security.html","https://www.openssh.com/txt/release-9.3p2","https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt","https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408","http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html","http://www.openwall.com/lists/oss-security/2023/07/20/1","http://www.openwall.com/lists/oss-security/2023/07/20/2","http://www.openwall.com/lists/oss-security/2023/09/22/11","http://www.openwall.com/lists/oss-security/2023/09/22/9","https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent","https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8","https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d","https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca","https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/","https://news.ycombinator.com/item?id=36790196","https://security.gentoo.org/glsa/202307-01","https://security.netapp.com/advisory/ntap-20230803-0010/","https://support.apple.com/kb/HT213940","https://www.openssh.com/security.html","https://www.openssh.com/txt/release-9.3p2","https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt","https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408"],"published_time":"2023-07-20T03:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3674","summary":"A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as untrusted.","cvss":2.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.3,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/errata/RHSA-2024:1139","https://access.redhat.com/security/cve/CVE-2023-3674","https://bugzilla.redhat.com/show_bug.cgi?id=2222903","https://github.com/keylime/keylime/commit/95ce3d86bd2c53009108ffda2dcf553312d733db","https://access.redhat.com/errata/RHSA-2024:1139","https://access.redhat.com/security/cve/CVE-2023-3674","https://bugzilla.redhat.com/show_bug.cgi?id=2222903","https://github.com/keylime/keylime/commit/95ce3d86bd2c53009108ffda2dcf553312d733db"],"published_time":"2023-07-19T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22056","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00151,"ranking_epss":0.35663,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html"],"published_time":"2023-07-18T21:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22057","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00057,"ranking_epss":0.17833,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html"],"published_time":"2023-07-18T21:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22058","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00151,"ranking_epss":0.35663,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html"],"published_time":"2023-07-18T21:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22046","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html"],"published_time":"2023-07-18T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22048","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth).  Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).","cvss":3.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00079,"ranking_epss":0.23502,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html"],"published_time":"2023-07-18T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22053","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs).  Supported versions that are affected are 5.7.42 and prior and  8.0.33 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server and  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H).","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21765,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html"],"published_time":"2023-07-18T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22054","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13354,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html"],"published_time":"2023-07-18T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22033","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html"],"published_time":"2023-07-18T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22038","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).","cvss":2.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.7,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10829,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html"],"published_time":"2023-07-18T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22008","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html"],"published_time":"2023-07-18T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22005","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication).  Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13354,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://www.oracle.com/security-alerts/cpujul2023.html"],"published_time":"2023-07-18T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-0160","summary":"A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00011,"ranking_epss":0.01286,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-0160","https://bugzilla.redhat.com/show_bug.cgi?id=2159764","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ed17aa92dc56","https://lore.kernel.org/all/CABcoxUayum5oOqFMMqAeWuS8+EzojquSOSyDA3J_2omY=2EeAg@mail.gmail.com/","https://access.redhat.com/security/cve/CVE-2023-0160","https://bugzilla.redhat.com/show_bug.cgi?id=2159764","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ed17aa92dc56","https://lore.kernel.org/all/CABcoxUayum5oOqFMMqAeWuS8+EzojquSOSyDA3J_2omY=2EeAg@mail.gmail.com/"],"published_time":"2023-07-18T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38403","summary":"iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01253,"ranking_epss":0.7938,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Oct/24","http://seclists.org/fulldisclosure/2023/Oct/26","https://bugs.debian.org/1040830","https://cwe.mitre.org/data/definitions/130.html","https://downloads.es.net/pub/iperf/esnet-secadv-2023-0001.txt.asc","https://github.com/esnet/iperf/commit/0ef151550d96cc4460f98832df84b4a1e87c65e9","https://github.com/esnet/iperf/issues/1542","https://lists.debian.org/debian-lts-announce/2023/07/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6EBWWF4PEQKROEVXGYSTIT2MGBTLU7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M25Z5FHTO3XWMGP37JHJ7IIIHSGCLKEV/","https://security.netapp.com/advisory/ntap-20230818-0016/","https://support.apple.com/kb/HT213984","https://support.apple.com/kb/HT213985","http://seclists.org/fulldisclosure/2023/Oct/24","http://seclists.org/fulldisclosure/2023/Oct/26","https://bugs.debian.org/1040830","https://cwe.mitre.org/data/definitions/130.html","https://downloads.es.net/pub/iperf/esnet-secadv-2023-0001.txt.asc","https://github.com/esnet/iperf/commit/0ef151550d96cc4460f98832df84b4a1e87c65e9","https://github.com/esnet/iperf/issues/1542","https://lists.debian.org/debian-lts-announce/2023/07/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6EBWWF4PEQKROEVXGYSTIT2MGBTLU7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M25Z5FHTO3XWMGP37JHJ7IIIHSGCLKEV/","https://security.netapp.com/advisory/ntap-20230818-0016/","https://support.apple.com/kb/HT213984","https://support.apple.com/kb/HT213985"],"published_time":"2023-07-17T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38253","summary":"An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str function in indep.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06195,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-38253","https://bugzilla.redhat.com/show_bug.cgi?id=2222779","https://github.com/tats/w3m/issues/271","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/","https://access.redhat.com/security/cve/CVE-2023-38253","https://bugzilla.redhat.com/show_bug.cgi?id=2222779","https://github.com/tats/w3m/issues/271","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/"],"published_time":"2023-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38252","summary":"An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02292,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-38252","https://bugzilla.redhat.com/show_bug.cgi?id=2222775","https://github.com/tats/w3m/issues/270","https://access.redhat.com/security/cve/CVE-2023-38252","https://bugzilla.redhat.com/show_bug.cgi?id=2222775","https://github.com/tats/w3m/issues/270","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/"],"published_time":"2023-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24834","summary":"Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.42077,"ranking_epss":0.97451,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/redis/redis/security/advisories/GHSA-p8x2-9v9q-c838","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIF5MAGYARYUMRFK7PQI7HYXMK2HZE5T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDNNH2ONMVNBQ6LUIAOAGDNFPKXNST5K/","https://security.netapp.com/advisory/ntap-20230814-0006/","https://github.com/redis/redis/security/advisories/GHSA-p8x2-9v9q-c838","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIF5MAGYARYUMRFK7PQI7HYXMK2HZE5T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDNNH2ONMVNBQ6LUIAOAGDNFPKXNST5K/","https://security.netapp.com/advisory/ntap-20230814-0006/"],"published_time":"2023-07-13T15:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3106","summary":"A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely.","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01621,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-3106","https://bugzilla.redhat.com/show_bug.cgi?id=2221501","https://github.com/torvalds/linux/commit/1ba5bf993c6a3142e18e68ea6452b347f9cb5635","https://access.redhat.com/security/cve/CVE-2023-3106","https://bugzilla.redhat.com/show_bug.cgi?id=2221501","https://github.com/torvalds/linux/commit/1ba5bf993c6a3142e18e68ea6452b347f9cb5635"],"published_time":"2023-07-12T09:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33170","summary":"ASP.NET and Visual Studio Security Feature Bypass Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00215,"ranking_epss":0.44037,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVZVMMCCBBCSCPAW2CRQGOTKIHVFCMRO/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5CFOR6ID2HP45E7ZOGQNX76FPIWP7XR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWNIIA2I6YCYVCXYBPBRSZ3UH6KILTG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VJRGNYJXGPF5LXUG3NL45QPK2UU6PL/","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170"],"published_time":"2023-07-11T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36824","summary":"Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.88502,"ranking_epss":0.99506,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/redis/redis/releases/tag/7.0.12","https://github.com/redis/redis/security/advisories/GHSA-4cfx-h9gq-xpx3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIF5MAGYARYUMRFK7PQI7HYXMK2HZE5T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDNNH2ONMVNBQ6LUIAOAGDNFPKXNST5K/","https://security.netapp.com/advisory/ntap-20230814-0009/","https://github.com/redis/redis/releases/tag/7.0.12","https://github.com/redis/redis/security/advisories/GHSA-4cfx-h9gq-xpx3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIF5MAGYARYUMRFK7PQI7HYXMK2HZE5T/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDNNH2ONMVNBQ6LUIAOAGDNFPKXNST5K/","https://security.netapp.com/advisory/ntap-20230814-0009/"],"published_time":"2023-07-11T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3354","summary":"A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.20721,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-3354","https://bugzilla.redhat.com/show_bug.cgi?id=2216478","https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/","https://access.redhat.com/security/cve/CVE-2023-3354","https://bugzilla.redhat.com/show_bug.cgi?id=2216478","https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/"],"published_time":"2023-07-11T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3269","summary":"A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00225,"ranking_epss":0.45215,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Jul/43","http://www.openwall.com/lists/oss-security/2023/07/28/1","http://www.openwall.com/lists/oss-security/2023/08/25/1","http://www.openwall.com/lists/oss-security/2023/08/25/4","https://access.redhat.com/security/cve/CVE-2023-3269","https://bugzilla.redhat.com/show_bug.cgi?id=2215268","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6AAA64CUPSMBW6XDTXPQJ3KQWYQ4K7L/","https://security.netapp.com/advisory/ntap-20230908-0001/","https://www.openwall.com/lists/oss-security/2023/07/05/1","http://seclists.org/fulldisclosure/2023/Jul/43","http://www.openwall.com/lists/oss-security/2023/07/28/1","http://www.openwall.com/lists/oss-security/2023/08/25/1","http://www.openwall.com/lists/oss-security/2023/08/25/4","https://access.redhat.com/security/cve/CVE-2023-3269","https://bugzilla.redhat.com/show_bug.cgi?id=2215268","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6AAA64CUPSMBW6XDTXPQJ3KQWYQ4K7L/","https://security.netapp.com/advisory/ntap-20230908-0001/","https://www.openwall.com/lists/oss-security/2023/07/05/1"],"published_time":"2023-07-11T12:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1672","summary":"A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.0781,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-1672","https://bugzilla.redhat.com/show_bug.cgi?id=2180999","https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096","https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html","https://www.openwall.com/lists/oss-security/2023/06/15/1","https://access.redhat.com/security/cve/CVE-2023-1672","https://bugzilla.redhat.com/show_bug.cgi?id=2180999","https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096","https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html","https://www.openwall.com/lists/oss-security/2023/06/15/1"],"published_time":"2023-07-11T12:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34432","summary":"A heap buffer overflow vulnerability was found in sox, in the lsx_readbuf function at sox/src/formats_i.c:98:16. This flaw can lead to a denial of service, code execution, or information disclosure.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10559,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-34432","https://bugzilla.redhat.com/show_bug.cgi?id=2212291","https://access.redhat.com/security/cve/CVE-2023-34432","https://bugzilla.redhat.com/show_bug.cgi?id=2212291"],"published_time":"2023-07-10T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-26590","summary":"A floating point exception vulnerability was found in sox, in the lsx_aiffstartwrite function at sox/src/aiff.c:622:58. This flaw can lead to a denial of service.","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08723,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-26590","https://bugzilla.redhat.com/show_bug.cgi?id=2212279","https://access.redhat.com/security/cve/CVE-2023-26590","https://bugzilla.redhat.com/show_bug.cgi?id=2212279"],"published_time":"2023-07-10T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32627","summary":"A floating point exception vulnerability was found in sox, in the read_samples function at sox/src/voc.c:334:18. This flaw can lead to a denial of service.","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00049,"ranking_epss":0.15145,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-32627","https://bugzilla.redhat.com/show_bug.cgi?id=2212282","https://lists.debian.org/debian-lts-announce/2023/08/msg00015.html","https://access.redhat.com/security/cve/CVE-2023-32627","https://bugzilla.redhat.com/show_bug.cgi?id=2212282","https://lists.debian.org/debian-lts-announce/2023/08/msg00015.html"],"published_time":"2023-07-10T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34318","summary":"A heap buffer overflow vulnerability was found in sox, in the startread function at sox/src/hcom.c:160:41. This flaw can lead to a denial of service, code execution, or information disclosure.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00033,"ranking_epss":0.09517,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-34318","https://bugzilla.redhat.com/show_bug.cgi?id=2212283","https://access.redhat.com/security/cve/CVE-2023-34318","https://bugzilla.redhat.com/show_bug.cgi?id=2212283"],"published_time":"2023-07-10T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1183","summary":"A flaw was found in the Libreoffice package. An attacker can craft an odb containing a \"database/script\" file with a SCRIPT command where the contents of the file could be written to a new file whose location was determined by the attacker.","cvss":5.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.0,"cvss_v4":null,"epss":0.06891,"ranking_epss":0.91407,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/12/28/4","http://www.openwall.com/lists/oss-security/2024/01/03/4","https://access.redhat.com/security/cve/CVE-2023-1183","https://bugzilla.redhat.com/show_bug.cgi?id=2208506","https://www.libreoffice.org/about-us/security/advisories/cve-2023-1183/","http://www.openwall.com/lists/oss-security/2023/12/28/4","http://www.openwall.com/lists/oss-security/2024/01/03/4","https://access.redhat.com/security/cve/CVE-2023-1183","https://bugzilla.redhat.com/show_bug.cgi?id=2208506","https://www.libreoffice.org/about-us/security/advisories/cve-2023-1183/"],"published_time":"2023-07-10T16:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35934","summary":"yt-dlp is a command-line program to download videos from video sites. During file downloads, yt-dlp or the external downloaders that yt-dlp employs may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. This vulnerable behavior is present in yt-dlp prior to 2023.07.06 and nightly 2023.07.06.185519. All native and external downloaders are affected, except for `curl` and `httpie` (version 3.1.0 or later).\n\nAt the file download stage, all cookies are passed by yt-dlp to the file downloader as a `Cookie` header, thereby losing their scope. This also occurs in yt-dlp's info JSON output, which may be used by external tools. As a result, the downloader or external tool may indiscriminately send cookies with requests to domains or paths for which the cookies are not scoped.\n\nyt-dlp version 2023.07.06 and nightly 2023.07.06.185519 fix this issue by removing the `Cookie` header upon HTTP redirects; having native downloaders calculate the `Cookie` header from the cookiejar, utilizing external downloaders' built-in support for cookies instead of passing them as header arguments, disabling HTTP redirectiong if the external downloader does not have proper cookie support, processing cookies passed as HTTP headers to limit their scope, and having a separate field for cookies in the info dict storing more information about scoping\n\nSome workarounds are available for those who are unable to upgrade. Avoid using cookies and user authentication methods. While extractors may set custom cookies, these usually do not contain sensitive information. Alternatively, avoid using `--load-info-json`. Or, if authentication is a must: verify the integrity of download links from unknown sources in browser (including redirects) before passing them to yt-dlp; use `curl` as external downloader, since it is not impacted; and/or avoid fragmented formats such as HLS/m3u8, DASH/mpd and ISM.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00646,"ranking_epss":0.70768,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/yt-dlp/yt-dlp-nightly-builds/releases/tag/2023.07.06.185519","https://github.com/yt-dlp/yt-dlp/commit/1ceb657bdd254ad961489e5060f2ccc7d556b729","https://github.com/yt-dlp/yt-dlp/commit/3121512228487c9c690d3d39bfd2579addf96e07","https://github.com/yt-dlp/yt-dlp/commit/f8b4bcc0a791274223723488bfbfc23ea3276641","https://github.com/yt-dlp/yt-dlp/releases/tag/2023.07.06","https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-v8mc-9377-rwjj","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5X6YT6AQE5FHM5VTQLKKJXSYBLLJF26W/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEOKCGVONGHR2SYUIXU33A4MKXZBDP6L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IM44RJL2MR2WG3ZY354C5IUEEZUJGEVA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7E7CQ5S5KMZHAMCNU7V7KYNBVCPLBHG/","https://github.com/yt-dlp/yt-dlp-nightly-builds/releases/tag/2023.07.06.185519","https://github.com/yt-dlp/yt-dlp/commit/1ceb657bdd254ad961489e5060f2ccc7d556b729","https://github.com/yt-dlp/yt-dlp/commit/3121512228487c9c690d3d39bfd2579addf96e07","https://github.com/yt-dlp/yt-dlp/commit/f8b4bcc0a791274223723488bfbfc23ea3276641","https://github.com/yt-dlp/yt-dlp/releases/tag/2023.07.06","https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-v8mc-9377-rwjj","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5X6YT6AQE5FHM5VTQLKKJXSYBLLJF26W/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEOKCGVONGHR2SYUIXU33A4MKXZBDP6L/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IM44RJL2MR2WG3ZY354C5IUEEZUJGEVA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7E7CQ5S5KMZHAMCNU7V7KYNBVCPLBHG/"],"published_time":"2023-07-06T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35001","summary":"Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00207,"ranking_epss":0.43165,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html","http://www.openwall.com/lists/oss-security/2023/07/05/3","https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/","https://lore.kernel.org/netfilter-devel/20230705121515.747251-1-cascardo@canonical.com/T/","https://security.netapp.com/advisory/ntap-20230824-0007/","https://www.debian.org/security/2023/dsa-5453","https://www.openwall.com/lists/oss-security/2023/07/05/3","http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html","http://www.openwall.com/lists/oss-security/2023/07/05/3","https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/","https://lore.kernel.org/netfilter-devel/20230705121515.747251-1-cascardo@canonical.com/T/","https://security.netapp.com/advisory/ntap-20230824-0007/","https://www.debian.org/security/2023/dsa-5453","https://www.openwall.com/lists/oss-security/2023/07/05/3"],"published_time":"2023-07-05T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-31248","summary":"Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00204,"ranking_epss":0.4261,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html","http://www.openwall.com/lists/oss-security/2023/07/05/2","https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/","https://lore.kernel.org/netfilter-devel/20230705121627.GC19489@breakpoint.cc/T/","https://security.netapp.com/advisory/ntap-20240201-0001/","https://www.debian.org/security/2023/dsa-5453","https://www.openwall.com/lists/oss-security/2023/07/05/2","http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html","http://www.openwall.com/lists/oss-security/2023/07/05/2","https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/","https://lore.kernel.org/netfilter-devel/20230705121627.GC19489@breakpoint.cc/T/","https://security.netapp.com/advisory/ntap-20240201-0001/","https://www.debian.org/security/2023/dsa-5453","https://www.openwall.com/lists/oss-security/2023/07/05/2"],"published_time":"2023-07-05T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36053","summary":"In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09595,"ranking_epss":0.92886,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.djangoproject.com/en/4.2/releases/security/","https://groups.google.com/forum/#%21forum/django-announce","https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/","https://www.debian.org/security/2023/dsa-5465","https://www.djangoproject.com/weblog/2023/jul/03/security-releases/","https://docs.djangoproject.com/en/4.2/releases/security/","https://groups.google.com/forum/#%21forum/django-announce","https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/","https://www.debian.org/security/2023/dsa-5465","https://www.djangoproject.com/weblog/2023/jul/03/security-releases/"],"published_time":"2023-07-03T13:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-30589","summary":"The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).\r\n\r\nThe CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16, v18, and, v20","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01916,"ranking_epss":0.83349,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/2001873","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMEELCREWMRT6NS7HWXLA6XFLLMO36HE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IV326O2X4BE3SINX5FJHMAKVHUAA4ZYF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEJWL67XR67JAGEL2ZK22NA3BRKNMZNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCVG4TQRGTK4LKAZKVEQAUEJM7DUACYE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKFMKD4MJZIKFQJAAJ4VZ2FHIJ764A76/","https://security.netapp.com/advisory/ntap-20230803-0009/","https://security.netapp.com/advisory/ntap-20240621-0006/","https://hackerone.com/reports/2001873","https://lists.debian.org/debian-lts-announce/2024/09/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMEELCREWMRT6NS7HWXLA6XFLLMO36HE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IV326O2X4BE3SINX5FJHMAKVHUAA4ZYF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEJWL67XR67JAGEL2ZK22NA3BRKNMZNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCVG4TQRGTK4LKAZKVEQAUEJM7DUACYE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKFMKD4MJZIKFQJAAJ4VZ2FHIJ764A76/","https://security.netapp.com/advisory/ntap-20230803-0009/","https://security.netapp.com/advisory/ntap-20240621-0006/"],"published_time":"2023-07-01T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1206","summary":"A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11238,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2175903","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","https://security.netapp.com/advisory/ntap-20230929-0006/","https://www.debian.org/security/2023/dsa-5480","https://www.debian.org/security/2023/dsa-5492","https://bugzilla.redhat.com/show_bug.cgi?id=2175903","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","https://security.netapp.com/advisory/ntap-20230929-0006/","https://www.debian.org/security/2023/dsa-5480","https://www.debian.org/security/2023/dsa-5492"],"published_time":"2023-06-30T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3431","summary":"Improper Access Control in GitHub repository plantuml/plantuml prior to 1.2023.9.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00119,"ranking_epss":0.30791,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/plantuml/plantuml/commit/fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e","https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FV7XL3CY3K3K5ER3ASMEQA546MIQQ7QM/","https://github.com/plantuml/plantuml/commit/fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e","https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FV7XL3CY3K3K5ER3ASMEQA546MIQQ7QM/"],"published_time":"2023-06-27T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3432","summary":"Server-Side Request Forgery (SSRF) in GitHub repository plantuml/plantuml prior to 1.2023.9.","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.00207,"ranking_epss":0.4315,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/plantuml/plantuml/commit/b32500bb61ae617bb312496d6d832e4be8190797","https://huntr.dev/bounties/8ac3316f-431c-468d-87e4-3dafff2ecf51","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FV7XL3CY3K3K5ER3ASMEQA546MIQQ7QM/","https://github.com/plantuml/plantuml/commit/b32500bb61ae617bb312496d6d832e4be8190797","https://huntr.dev/bounties/8ac3316f-431c-468d-87e4-3dafff2ecf51","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FV7XL3CY3K3K5ER3ASMEQA546MIQQ7QM/"],"published_time":"2023-06-27T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36664","summary":"Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.06431,"ranking_epss":0.91083,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugs.ghostscript.com/show_bug.cgi?id=706761","https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d","https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=505eab7782b429017eb434b2b95120855f2b0e3c","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV/","https://security.gentoo.org/glsa/202309-03","https://www.debian.org/security/2023/dsa-5446","https://bugs.ghostscript.com/show_bug.cgi?id=706761","https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d","https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=505eab7782b429017eb434b2b95120855f2b0e3c","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV/","https://security.gentoo.org/glsa/202309-03","https://www.debian.org/security/2023/dsa-5446"],"published_time":"2023-06-25T22:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3212","summary":"A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01706,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2214348","https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","https://security.netapp.com/advisory/ntap-20230929-0005/","https://www.debian.org/security/2023/dsa-5448","https://www.debian.org/security/2023/dsa-5480","https://bugzilla.redhat.com/show_bug.cgi?id=2214348","https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","https://security.netapp.com/advisory/ntap-20230929-0005/","https://www.debian.org/security/2023/dsa-5448","https://www.debian.org/security/2023/dsa-5480"],"published_time":"2023-06-23T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34241","summary":"OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process.\n\nThe exact cause of this issue is the function `httpClose(con->http)` being called in `scheduler/client.c`. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function `cupsdAcceptClient` if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in `cupsd.conf`) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from `/etc/hosts.allow` and `/etc/hosts.deny`.\n\nVersion 2.4.6 has a patch for this issue.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.1158,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/06/23/10","http://www.openwall.com/lists/oss-security/2023/06/26/1","https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2","https://github.com/OpenPrinting/cups/releases/tag/v2.4.6","https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25","https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/","https://support.apple.com/kb/HT213843","https://support.apple.com/kb/HT213844","https://support.apple.com/kb/HT213845","http://www.openwall.com/lists/oss-security/2023/06/23/10","http://www.openwall.com/lists/oss-security/2023/06/26/1","https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2","https://github.com/OpenPrinting/cups/releases/tag/v2.4.6","https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25","https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/","https://support.apple.com/kb/HT213843","https://support.apple.com/kb/HT213844","https://support.apple.com/kb/HT213845"],"published_time":"2023-06-22T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2828","summary":"Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit.\n\nIt has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded.\nThis issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01176,"ranking_epss":0.78744,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/06/21/6","https://kb.isc.org/docs/cve-2023-2828","https://lists.debian.org/debian-lts-announce/2023/07/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/","https://security.netapp.com/advisory/ntap-20230703-0010/","https://www.debian.org/security/2023/dsa-5439","http://www.openwall.com/lists/oss-security/2023/06/21/6","https://kb.isc.org/docs/cve-2023-2828","https://lists.debian.org/debian-lts-announce/2023/07/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/","https://security.netapp.com/advisory/ntap-20230703-0010/","https://www.debian.org/security/2023/dsa-5439"],"published_time":"2023-06-21T17:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2911","summary":"If the `recursive-clients` quota is reached on a BIND 9 resolver configured with both `stale-answer-enable yes;` and `stale-answer-client-timeout 0;`, a sequence of serve-stale-related lookups could cause `named` to loop and terminate unexpectedly due to a stack overflow.\nThis issue affects BIND 9 versions 9.16.33 through 9.16.41, 9.18.7 through 9.18.15, 9.16.33-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00177,"ranking_epss":0.39299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/06/21/6","https://kb.isc.org/docs/cve-2023-2911","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/","https://security.netapp.com/advisory/ntap-20230703-0010/","https://www.debian.org/security/2023/dsa-5439","http://www.openwall.com/lists/oss-security/2023/06/21/6","https://kb.isc.org/docs/cve-2023-2911","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/","https://security.netapp.com/advisory/ntap-20230703-0010/","https://www.debian.org/security/2023/dsa-5439"],"published_time":"2023-06-21T17:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34474","summary":"A heap-based buffer overflow issue was discovered in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c. A local attacker could trick the user in opening specially crafted file, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10195,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-34474","https://bugzilla.redhat.com/show_bug.cgi?id=2214148","https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45DUUXYMAEEAW55GSLAXN25VPKCRAIDA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/","https://access.redhat.com/security/cve/CVE-2023-34474","https://bugzilla.redhat.com/show_bug.cgi?id=2214148","https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45DUUXYMAEEAW55GSLAXN25VPKCRAIDA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/"],"published_time":"2023-06-16T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34475","summary":"A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00024,"ranking_epss":0.06613,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-34475","https://bugzilla.redhat.com/show_bug.cgi?id=2214149","https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45DUUXYMAEEAW55GSLAXN25VPKCRAIDA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/","https://access.redhat.com/security/cve/CVE-2023-34475","https://bugzilla.redhat.com/show_bug.cgi?id=2214149","https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45DUUXYMAEEAW55GSLAXN25VPKCRAIDA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/"],"published_time":"2023-06-16T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3195","summary":"A stack-based buffer overflow issue was found in ImageMagick's coders/tiff.c. This flaw allows an attacker to trick the user into opening a specially crafted malicious tiff file, causing an application to crash, resulting in a denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08901,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-3195","https://bugzilla.redhat.com/show_bug.cgi?id=2214141","https://github.com/ImageMagick/ImageMagick/commit/f620340935777b28fa3f7b0ed7ed6bd86946934c","https://github.com/ImageMagick/ImageMagick6/commit/85a370c79afeb45a97842b0959366af5236e9023","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45DUUXYMAEEAW55GSLAXN25VPKCRAIDA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/","https://www.openwall.com/lists/oss-security/2023/05/29/1","https://access.redhat.com/security/cve/CVE-2023-3195","https://bugzilla.redhat.com/show_bug.cgi?id=2214141","https://github.com/ImageMagick/ImageMagick/commit/f620340935777b28fa3f7b0ed7ed6bd86946934c","https://github.com/ImageMagick/ImageMagick6/commit/85a370c79afeb45a97842b0959366af5236e9023","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45DUUXYMAEEAW55GSLAXN25VPKCRAIDA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/","https://www.openwall.com/lists/oss-security/2023/05/29/1"],"published_time":"2023-06-16T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2431","summary":"A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.","cvss":3.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.4,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.01132,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/kubernetes/kubernetes/issues/118690","https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQa10","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43HDSKBKPSW53OW647B5ETHRWFFNHSRQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBX4RL4UOC7JHWWYB2AJCKSUM7EG5Y5G/","https://github.com/kubernetes/kubernetes/issues/118690","https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQa10","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43HDSKBKPSW53OW647B5ETHRWFFNHSRQ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBX4RL4UOC7JHWWYB2AJCKSUM7EG5Y5G/","https://github.com/kubernetes/kubernetes/issues/118690"],"published_time":"2023-06-16T08:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-30631","summary":"Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0.\n\n8.x users should upgrade to 8.1.7 or later versions\n9.x users should upgrade to 9.2.1 or later versions","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00662,"ranking_epss":0.71201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs","https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/","https://www.debian.org/security/2023/dsa-5435","https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs","https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/","https://www.debian.org/security/2023/dsa-5435"],"published_time":"2023-06-14T08:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3214","summary":"Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01847,"ranking_epss":0.83023,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html","https://crbug.com/1450568","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5428","https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html","https://crbug.com/1450568","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5428"],"published_time":"2023-06-13T18:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3215","summary":"Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.20975,"ranking_epss":0.95651,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html","https://crbug.com/1446274","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5428","https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html","https://crbug.com/1446274","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5428"],"published_time":"2023-06-13T18:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3216","summary":"Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00924,"ranking_epss":0.7604,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html","https://crbug.com/1450114","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5428","https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html","https://crbug.com/1450114","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5428"],"published_time":"2023-06-13T18:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3217","summary":"Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.17457,"ranking_epss":0.95088,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/173495/Chrome-device-OpenXrApiWrapper-InitSession-Heap-Use-After-Free.html","https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html","https://crbug.com/1450601","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5428","http://packetstormsecurity.com/files/173495/Chrome-device-OpenXrApiWrapper-InitSession-Heap-Use-After-Free.html","https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html","https://crbug.com/1450601","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202401-34","https://www.debian.org/security/2023/dsa-5428"],"published_time":"2023-06-13T18:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-20867","summary":"A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.","cvss":3.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.9,"cvss_v4":null,"epss":0.02946,"ranking_epss":0.86468,"kev":true,"propose_action":"VMware Tools contains an authentication bypass vulnerability in the vgauth module. A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. An attacker must have root access over ESXi to exploit this vulnerability.","ransomware_campaign":"Unknown","references":["http://www.openwall.com/lists/oss-security/2023/10/16/11","http://www.openwall.com/lists/oss-security/2023/10/16/2","https://lists.debian.org/debian-lts-announce/2023/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVKQ6Y2JFJRWPFOZUOTFO3H27BK5GGOG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJNJMD67QIT6LXLKWSHFM47DCLRSMT6W/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJM6HDRQYS74JA7YNKQBFH2XSZ52HEWH/","https://security.netapp.com/advisory/ntap-20230725-0001/","https://www.debian.org/security/2023/dsa-5493","https://www.vmware.com/security/advisories/VMSA-2023-0013.html","http://www.openwall.com/lists/oss-security/2023/10/16/11","http://www.openwall.com/lists/oss-security/2023/10/16/2","https://lists.debian.org/debian-lts-announce/2023/08/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVKQ6Y2JFJRWPFOZUOTFO3H27BK5GGOG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJNJMD67QIT6LXLKWSHFM47DCLRSMT6W/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJM6HDRQYS74JA7YNKQBFH2XSZ52HEWH/","https://security.netapp.com/advisory/ntap-20230725-0001/","https://www.debian.org/security/2023/dsa-5493","https://www.vmware.com/security/advisories/VMSA-2023-0013.html","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-20867"],"published_time":"2023-06-13T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3161","summary":"A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02231,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2213485","https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be","https://bugzilla.redhat.com/show_bug.cgi?id=2213485","https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be"],"published_time":"2023-06-12T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2454","summary":"schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.00244,"ranking_epss":0.47686,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-2454","https://security.netapp.com/advisory/ntap-20230706-0006/","https://www.postgresql.org/support/security/CVE-2023-2454/","https://access.redhat.com/security/cve/CVE-2023-2454","https://security.netapp.com/advisory/ntap-20230706-0006/","https://www.postgresql.org/support/security/CVE-2023-2454/"],"published_time":"2023-06-09T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2455","summary":"Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00226,"ranking_epss":0.45464,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-2455","https://security.netapp.com/advisory/ntap-20230706-0006/","https://www.postgresql.org/support/security/CVE-2023-2455/","https://access.redhat.com/security/cve/CVE-2023-2455","https://security.netapp.com/advisory/ntap-20230706-0006/","https://www.postgresql.org/support/security/CVE-2023-2455/"],"published_time":"2023-06-09T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32732","summary":"gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in  https://github.com/grpc/grpc/pull/32309 https://www.google.com/url","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00024,"ranking_epss":0.06547,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/grpc/grpc/pull/32309","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/","https://github.com/grpc/grpc/pull/32309","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/"],"published_time":"2023-06-09T11:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29404","summary":"The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00084,"ranking_epss":0.24427,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://go.dev/cl/501225","https://go.dev/issue/60305","https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/","https://pkg.go.dev/vuln/GO-2023-1841","https://security.gentoo.org/glsa/202311-09","https://go.dev/cl/501225","https://go.dev/issue/60305","https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/","https://pkg.go.dev/vuln/GO-2023-1841","https://security.gentoo.org/glsa/202311-09","https://security.netapp.com/advisory/ntap-20241115-0009/"],"published_time":"2023-06-08T21:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29405","summary":"The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00329,"ranking_epss":0.55961,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://go.dev/cl/501224","https://go.dev/issue/60306","https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/","https://pkg.go.dev/vuln/GO-2023-1842","https://security.gentoo.org/glsa/202311-09","https://go.dev/cl/501224","https://go.dev/issue/60306","https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/","https://pkg.go.dev/vuln/GO-2023-1842","https://security.gentoo.org/glsa/202311-09","https://security.netapp.com/advisory/ntap-20241206-0003/"],"published_time":"2023-06-08T21:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29402","summary":"The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via \"go get\", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31753,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://go.dev/cl/501226","https://go.dev/issue/60167","https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/","https://pkg.go.dev/vuln/GO-2023-1839","https://security.gentoo.org/glsa/202311-09","https://go.dev/cl/501226","https://go.dev/issue/60167","https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/","https://pkg.go.dev/vuln/GO-2023-1839","https://security.gentoo.org/glsa/202311-09","https://security.netapp.com/advisory/ntap-20241213-0004/"],"published_time":"2023-06-08T21:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29403","summary":"On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.01055,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://go.dev/cl/501223","https://go.dev/issue/60272","https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/","https://pkg.go.dev/vuln/GO-2023-1840","https://security.gentoo.org/glsa/202311-09","https://go.dev/cl/501223","https://go.dev/issue/60272","https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/","https://pkg.go.dev/vuln/GO-2023-1840","https://security.gentoo.org/glsa/202311-09","https://security.netapp.com/advisory/ntap-20241220-0009/"],"published_time":"2023-06-08T21:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34969","summary":"D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00728,"ranking_epss":0.72673,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.freedesktop.org/dbus/dbus/-/issues/457","https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/","https://security.netapp.com/advisory/ntap-20231208-0007/","https://gitlab.freedesktop.org/dbus/dbus/-/issues/457","https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/","https://security.netapp.com/advisory/ntap-20231208-0007/"],"published_time":"2023-06-08T03:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2603","summary":"A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01222,"ranking_epss":0.79121,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2209113","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/","https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf","https://bugzilla.redhat.com/show_bug.cgi?id=2209113","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/","https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf"],"published_time":"2023-06-06T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2602","summary":"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03641,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2209114","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/","https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf","https://bugzilla.redhat.com/show_bug.cgi?id=2209114","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/","https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf"],"published_time":"2023-06-06T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33460","summary":"There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse function. which will cause out-of-memory in server and cause crash.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00117,"ranking_epss":0.30587,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/lloyd/yajl/issues/250","https://lists.debian.org/debian-lts-announce/2023/07/msg00000.html","https://lists.debian.org/debian-lts-announce/2023/07/msg00013.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00003.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBUUHG27RM4ROEYKMVRROR27AX6R63MB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLE3C4CECEJ4EUYI56KXI6OWACWXX7WN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO32YDJ74DADC7CMJNLSLBVWN5EXGF5J/","https://github.com/lloyd/yajl/issues/250","https://lists.debian.org/debian-lts-announce/2023/07/msg00000.html","https://lists.debian.org/debian-lts-announce/2023/07/msg00013.html","https://lists.debian.org/debian-lts-announce/2023/08/msg00003.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBUUHG27RM4ROEYKMVRROR27AX6R63MB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLE3C4CECEJ4EUYI56KXI6OWACWXX7WN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO32YDJ74DADC7CMJNLSLBVWN5EXGF5J/"],"published_time":"2023-06-06T12:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-3079","summary":"Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02049,"ranking_epss":0.83893,"kev":true,"propose_action":"Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["http://packetstormsecurity.com/files/176211/Chrome-V8-Type-Confusion.html","http://packetstormsecurity.com/files/176212/Chrome-V8-Type-Confusion-New-Sandbox-Escape.html","https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html","https://crbug.com/1450481","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYTXO5E3FI3I2ETDP3HF4SHYYTFMKMIC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4OXTNIZY4JYHJT7CVLPAJQILI6BISVM/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202401-34","https://www.couchbase.com/alerts/","https://www.debian.org/security/2023/dsa-5420","http://packetstormsecurity.com/files/176211/Chrome-V8-Type-Confusion.html","http://packetstormsecurity.com/files/176212/Chrome-V8-Type-Confusion-New-Sandbox-Escape.html","https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html","https://crbug.com/1450481","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYTXO5E3FI3I2ETDP3HF4SHYYTFMKMIC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4OXTNIZY4JYHJT7CVLPAJQILI6BISVM/","https://security.gentoo.org/glsa/202311-11","https://security.gentoo.org/glsa/202401-34","https://www.couchbase.com/alerts/","https://www.debian.org/security/2023/dsa-5420","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-3079"],"published_time":"2023-06-05T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34410","summary":"An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00114,"ranking_epss":0.29924,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://codereview.qt-project.org/c/qt/qtbase/+/477560","https://codereview.qt-project.org/c/qt/qtbase/+/480002","https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3IHQZCEUFVOPWG75V2HDKXNUZBB4FX/","https://codereview.qt-project.org/c/qt/qtbase/+/477560","https://codereview.qt-project.org/c/qt/qtbase/+/480002","https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3IHQZCEUFVOPWG75V2HDKXNUZBB4FX/"],"published_time":"2023-06-05T03:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34151","summary":"A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546).","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.21027,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-34151","https://bugzilla.redhat.com/show_bug.cgi?id=2210657","https://github.com/ImageMagick/ImageMagick/issues/6341","https://lists.debian.org/debian-lts-announce/2024/02/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2ZUHZXQ2C3JZYKPW4XHCMVVL467MA2V/","https://access.redhat.com/security/cve/CVE-2023-34151","https://bugzilla.redhat.com/show_bug.cgi?id=2210657","https://github.com/ImageMagick/ImageMagick/issues/6341","https://lists.debian.org/debian-lts-announce/2024/02/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2ZUHZXQ2C3JZYKPW4XHCMVVL467MA2V/"],"published_time":"2023-05-30T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34152","summary":"A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.74964,"ranking_epss":0.98873,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-34152","https://bugzilla.redhat.com/show_bug.cgi?id=2210659","https://github.com/ImageMagick/ImageMagick/issues/6339","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2ZUHZXQ2C3JZYKPW4XHCMVVL467MA2V/","https://access.redhat.com/security/cve/CVE-2023-34152","https://bugzilla.redhat.com/show_bug.cgi?id=2210659","https://github.com/ImageMagick/ImageMagick/issues/6339","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2ZUHZXQ2C3JZYKPW4XHCMVVL467MA2V/"],"published_time":"2023-05-30T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-34153","summary":"A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00703,"ranking_epss":0.72102,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-34153","https://bugzilla.redhat.com/show_bug.cgi?id=2210660","https://github.com/ImageMagick/ImageMagick/issues/6338","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2ZUHZXQ2C3JZYKPW4XHCMVVL467MA2V/","https://access.redhat.com/security/cve/CVE-2023-34153","https://bugzilla.redhat.com/show_bug.cgi?id=2210660","https://github.com/ImageMagick/ImageMagick/issues/6338","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2ZUHZXQ2C3JZYKPW4XHCMVVL467MA2V/"],"published_time":"2023-05-30T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28321","summary":"An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as \"Subject Alternative Name\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00297,"ranking_epss":0.53064,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Jul/47","http://seclists.org/fulldisclosure/2023/Jul/48","http://seclists.org/fulldisclosure/2023/Jul/52","https://hackerone.com/reports/1950627","https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230609-0009/","https://support.apple.com/kb/HT213843","https://support.apple.com/kb/HT213844","https://support.apple.com/kb/HT213845","http://seclists.org/fulldisclosure/2023/Jul/47","http://seclists.org/fulldisclosure/2023/Jul/48","http://seclists.org/fulldisclosure/2023/Jul/52","https://hackerone.com/reports/1950627","https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230609-0009/","https://support.apple.com/kb/HT213843","https://support.apple.com/kb/HT213844","https://support.apple.com/kb/HT213845"],"published_time":"2023-05-26T21:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28322","summary":"An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.","cvss":3.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00631,"ranking_epss":0.70341,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Jul/47","http://seclists.org/fulldisclosure/2023/Jul/48","http://seclists.org/fulldisclosure/2023/Jul/52","https://hackerone.com/reports/1954658","https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230609-0009/","https://support.apple.com/kb/HT213843","https://support.apple.com/kb/HT213844","https://support.apple.com/kb/HT213845","http://seclists.org/fulldisclosure/2023/Jul/47","http://seclists.org/fulldisclosure/2023/Jul/48","http://seclists.org/fulldisclosure/2023/Jul/52","https://hackerone.com/reports/1954658","https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230609-0009/","https://support.apple.com/kb/HT213843","https://support.apple.com/kb/HT213844","https://support.apple.com/kb/HT213845"],"published_time":"2023-05-26T21:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32681","summary":"Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.06121,"ranking_epss":0.90817,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5","https://github.com/psf/requests/releases/tag/v2.31.0","https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q","https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/","https://security.gentoo.org/glsa/202309-08","https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5","https://github.com/psf/requests/releases/tag/v2.31.0","https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q","https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/","https://security.gentoo.org/glsa/202309-08"],"published_time":"2023-05-26T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22970","summary":"Bottles before 51.0 mishandles YAML load, which allows remote code execution via a crafted file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01244,"ranking_epss":0.79294,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/bottlesdevs/Bottles/issues/2463","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N24KI3O3FWGKJSLATY35ZM3CHSABJ6WE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJZEE4RAAK7OPVQNE4BOWUVQDVSZU6NJ/","https://github.com/bottlesdevs/Bottles/issues/2463","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N24KI3O3FWGKJSLATY35ZM3CHSABJ6WE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJZEE4RAAK7OPVQNE4BOWUVQDVSZU6NJ/"],"published_time":"2023-05-26T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2283","summary":"A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00177,"ranking_epss":0.39239,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html","https://access.redhat.com/security/cve/CVE-2023-2283","https://bugzilla.redhat.com/show_bug.cgi?id=2189736","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN/","https://security.gentoo.org/glsa/202312-05","https://security.netapp.com/advisory/ntap-20240201-0005/","https://www.libssh.org/security/advisories/CVE-2023-2283.txt","http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html","http://seclists.org/fulldisclosure/2025/Feb/18","https://access.redhat.com/security/cve/CVE-2023-2283","https://bugzilla.redhat.com/show_bug.cgi?id=2189736","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN/","https://security.gentoo.org/glsa/202312-05","https://security.netapp.com/advisory/ntap-20240201-0005/","https://www.libssh.org/security/advisories/CVE-2023-2283.txt"],"published_time":"2023-05-26T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1981","summary":"A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03395,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-1981","https://bugzilla.redhat.com/show_bug.cgi?id=2185911","https://github.com/lathiat/avahi/issues/375","https://access.redhat.com/security/cve/CVE-2023-1981","https://bugzilla.redhat.com/show_bug.cgi?id=2185911","https://github.com/lathiat/avahi/issues/375","https://lists.debian.org/debian-lts-announce/2024/12/msg00011.html"],"published_time":"2023-05-26T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1667","summary":"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01131,"ranking_epss":0.78353,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.libssh.org/security/advisories/CVE-2023-1667.txt","https://access.redhat.com/security/cve/CVE-2023-1667","https://bugzilla.redhat.com/show_bug.cgi?id=2182199","https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN/","https://security.gentoo.org/glsa/202312-05","http://www.libssh.org/security/advisories/CVE-2023-1667.txt","https://access.redhat.com/security/cve/CVE-2023-1667","https://bugzilla.redhat.com/show_bug.cgi?id=2182199","https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN/","https://security.gentoo.org/glsa/202312-05"],"published_time":"2023-05-26T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32067","summary":"c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00409,"ranking_epss":0.61352,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1","https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc","https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/","https://security.gentoo.org/glsa/202310-09","https://security.netapp.com/advisory/ntap-20240605-0004/","https://www.debian.org/security/2023/dsa-5419","https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1","https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc","https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/","https://security.gentoo.org/glsa/202310-09","https://security.netapp.com/advisory/ntap-20240605-0004/","https://www.debian.org/security/2023/dsa-5419"],"published_time":"2023-05-25T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-31124","summary":"c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android.  This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.","cvss":3.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.7,"cvss_v4":null,"epss":0.00075,"ranking_epss":0.2252,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1","https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/","https://security.gentoo.org/glsa/202310-09","https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1","https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/","https://security.gentoo.org/glsa/202310-09"],"published_time":"2023-05-25T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-31130","summary":"c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular \"0::00:00:00/2\" was found to cause an issue.  C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.","cvss":4.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.1,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01769,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1","https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v","https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/","https://security.gentoo.org/glsa/202310-09","https://security.netapp.com/advisory/ntap-20240605-0005/","https://www.debian.org/security/2023/dsa-5419","https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1","https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v","https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/","https://security.gentoo.org/glsa/202310-09","https://security.netapp.com/advisory/ntap-20240605-0005/","https://www.debian.org/security/2023/dsa-5419"],"published_time":"2023-05-25T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-31147","summary":"c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. This issue has been fixed in version 1.19.1.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00093,"ranking_epss":0.25945,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1","https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/","https://security.gentoo.org/glsa/202310-09","https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1","https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/","https://security.gentoo.org/glsa/202310-09"],"published_time":"2023-05-25T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33204","summary":"sysstat through 12.7.2 allows a multiplication integer overflow in check_overflow in common.c. NOTE: this issue exists because of an incomplete fix for CVE-2022-39377.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08559,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/sysstat/sysstat/pull/360","https://lists.debian.org/debian-lts-announce/2023/05/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7UUEKMNDMC6RZTI4O367ZD2YKCOX5THX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NUBFX3UNOSM7KFUIB3J32ASYT5ZRXJQV/","https://github.com/sysstat/sysstat/pull/360","https://lists.debian.org/debian-lts-announce/2023/05/msg00026.html","https://lists.debian.org/debian-lts-announce/2025/10/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7UUEKMNDMC6RZTI4O367ZD2YKCOX5THX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NUBFX3UNOSM7KFUIB3J32ASYT5ZRXJQV/"],"published_time":"2023-05-18T08:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2731","summary":"A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.01148,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-2731","https://bugzilla.redhat.com/show_bug.cgi?id=2207635","https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b","https://gitlab.com/libtiff/libtiff/-/issues/548","https://security.netapp.com/advisory/ntap-20230703-0009/","https://access.redhat.com/security/cve/CVE-2023-2731","https://bugzilla.redhat.com/show_bug.cgi?id=2207635","https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b","https://gitlab.com/libtiff/libtiff/-/issues/548","https://security.netapp.com/advisory/ntap-20230703-0009/"],"published_time":"2023-05-17T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24805","summary":"cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.08929,"ranking_epss":0.92598,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65","https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x","https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/","https://security.gentoo.org/glsa/202401-06","https://www.debian.org/security/2023/dsa-5407","https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65","https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x","https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/","https://security.gentoo.org/glsa/202401-06","https://www.debian.org/security/2023/dsa-5407"],"published_time":"2023-05-17T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2721","summary":"Use after free in Navigation in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00226,"ranking_epss":0.45386,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1444360","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1444360","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404"],"published_time":"2023-05-16T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2722","summary":"Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00261,"ranking_epss":0.49471,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1400905","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1400905","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404"],"published_time":"2023-05-16T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2723","summary":"Use after free in DevTools in Google Chrome prior to 113.0.5672.126 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.11797,"ranking_epss":0.93736,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1435166","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1435166","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404"],"published_time":"2023-05-16T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2724","summary":"Type confusion in V8 in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.15218,"ranking_epss":0.94624,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/173131/Chrome-Internal-JavaScript-Object-Access-Via-Origin-Trials.html","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1433211","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404","http://packetstormsecurity.com/files/173131/Chrome-Internal-JavaScript-Object-Access-Via-Origin-Trials.html","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1433211","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404"],"published_time":"2023-05-16T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2725","summary":"Use after free in Guest View in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.10362,"ranking_epss":0.9322,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1442516","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1442516","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404"],"published_time":"2023-05-16T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2726","summary":"Inappropriate implementation in WebApp Installs in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious web app to bypass install dialog via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07644,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1442018","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html","https://crbug.com/1442018","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/","https://security.gentoo.org/glsa/202309-17","https://security.gentoo.org/glsa/202311-11","https://www.debian.org/security/2023/dsa-5404"],"published_time":"2023-05-16T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2700","summary":"A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09949,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-2700","https://bugzilla.redhat.com/show_bug.cgi?id=2203653","https://gitlab.com/libvirt/libvirt/-/commit/6425a311b8ad19d6f9c0b315bf1d722551ea3585#874a1e768ade6ceb4538931cbc06248e73223306","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVK6JKP36CHE7YAFDJNPNLTW4OWJJ7TQ/","https://security.netapp.com/advisory/ntap-20230706-0001/","https://access.redhat.com/security/cve/CVE-2023-2700","https://bugzilla.redhat.com/show_bug.cgi?id=2203653","https://gitlab.com/libvirt/libvirt/-/commit/6425a311b8ad19d6f9c0b315bf1d722551ea3585#874a1e768ade6ceb4538931cbc06248e73223306","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVK6JKP36CHE7YAFDJNPNLTW4OWJJ7TQ/","https://security.netapp.com/advisory/ntap-20230706-0001/"],"published_time":"2023-05-15T22:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1729","summary":"A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00062,"ranking_epss":0.19322,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2188240","https://github.com/LibRaw/LibRaw/issues/557","https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/","https://security.gentoo.org/glsa/202312-08","https://www.debian.org/security/2023/dsa-5412","https://bugzilla.redhat.com/show_bug.cgi?id=2188240","https://github.com/LibRaw/LibRaw/issues/557","https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/","https://security.gentoo.org/glsa/202312-08","https://www.debian.org/security/2023/dsa-5412"],"published_time":"2023-05-15T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32570","summary":"VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that can lead to an application crash, related to dav1d_decode_frame_exit.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00065,"ranking_epss":0.20137,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://code.videolan.org/videolan/dav1d/-/commit/cf617fdae0b9bfabd27282854c8e81450d955efa","https://code.videolan.org/videolan/dav1d/-/tags/1.2.0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WGSO7UMOF4MVLQ5H6KIV7OG6ONS377B/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXZ6CUNJFDJLCFOZHY2TIGMCAEITLCRP/","https://security.gentoo.org/glsa/202310-05","https://code.videolan.org/videolan/dav1d/-/commit/cf617fdae0b9bfabd27282854c8e81450d955efa","https://code.videolan.org/videolan/dav1d/-/tags/1.2.0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WGSO7UMOF4MVLQ5H6KIV7OG6ONS377B/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXZ6CUNJFDJLCFOZHY2TIGMCAEITLCRP/","https://security.gentoo.org/glsa/202310-05"],"published_time":"2023-05-10T05:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2156","summary":"A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02085,"ranking_epss":0.8403,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/05/17/8","http://www.openwall.com/lists/oss-security/2023/05/17/9","http://www.openwall.com/lists/oss-security/2023/05/18/1","http://www.openwall.com/lists/oss-security/2023/05/19/1","https://bugzilla.redhat.com/show_bug.cgi?id=2196292","https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html","https://security.netapp.com/advisory/ntap-20230622-0001/","https://www.debian.org/security/2023/dsa-5448","https://www.debian.org/security/2023/dsa-5453","https://www.zerodayinitiative.com/advisories/ZDI-23-547/","http://www.openwall.com/lists/oss-security/2023/05/17/8","http://www.openwall.com/lists/oss-security/2023/05/17/9","http://www.openwall.com/lists/oss-security/2023/05/18/1","http://www.openwall.com/lists/oss-security/2023/05/19/1","https://bugzilla.redhat.com/show_bug.cgi?id=2196292","https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html","https://security.netapp.com/advisory/ntap-20230622-0001/","https://www.debian.org/security/2023/dsa-5448","https://www.debian.org/security/2023/dsa-5453","https://www.zerodayinitiative.com/advisories/ZDI-23-547/"],"published_time":"2023-05-09T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2609","summary":"NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1531.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00018,"ranking_epss":0.04763,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/vim/vim/commit/d1ae8366aff286d41e7f5bc513cc0a1af5130aad","https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/","https://support.apple.com/kb/HT213844","https://support.apple.com/kb/HT213845","https://github.com/vim/vim/commit/d1ae8366aff286d41e7f5bc513cc0a1af5130aad","https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/","https://support.apple.com/kb/HT213844","https://support.apple.com/kb/HT213845"],"published_time":"2023-05-09T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-31489","summary":"An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_capability_llgr() function.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00325,"ranking_epss":0.55557,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FRRouting/frr/issues/13098","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/","https://github.com/FRRouting/frr/issues/13098","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/"],"published_time":"2023-05-09T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-31490","summary":"An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_attr_psid_sub() function.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05772,"ranking_epss":0.90493,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FRRouting/frr/issues/13099","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/","https://www.debian.org/security/2023/dsa-5495","https://github.com/FRRouting/frr/issues/13099","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/","https://www.debian.org/security/2023/dsa-5495"],"published_time":"2023-05-09T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-31137","summary":"MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination.\n\nThe vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service.\n\nOne proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len <= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01246,"ranking_epss":0.79323,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886","https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58","https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c","https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/","https://www.debian.org/security/2023/dsa-5441","https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886","https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58","https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c","https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/","https://www.debian.org/security/2023/dsa-5441"],"published_time":"2023-05-09T14:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-31047","summary":"In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's \"Uploading multiple files\" documentation suggested otherwise.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00122,"ranking_epss":0.31306,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.djangoproject.com/en/4.2/releases/security/","https://groups.google.com/forum/#%21forum/django-announce","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/","https://security.netapp.com/advisory/ntap-20230609-0008/","https://www.djangoproject.com/weblog/2023/may/03/security-releases/","https://docs.djangoproject.com/en/4.2/releases/security/","https://groups.google.com/forum/#%21forum/django-announce","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/","https://security.netapp.com/advisory/ntap-20230609-0008/","https://www.djangoproject.com/weblog/2023/may/03/security-releases/"],"published_time":"2023-05-07T02:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29659","summary":"A Segmentation fault caused by a floating point exception exists in libheif 1.15.1 using crafted heif images via the heif::Fraction::round() function in box.cc, which causes a denial of service.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00134,"ranking_epss":0.3305,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/strukturag/libheif/issues/794","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAE6NQBA3Q7GS6VTNDZRZZZVPPEFUEZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LGKHDCS4HRZE3UGXYYDYPTIPNIBRLQ5L/","https://github.com/strukturag/libheif/issues/794","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAE6NQBA3Q7GS6VTNDZRZZZVPPEFUEZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LGKHDCS4HRZE3UGXYYDYPTIPNIBRLQ5L/"],"published_time":"2023-05-05T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2460","summary":"Insufficient validation of untrusted input in Extensions in Google Chrome prior to 113.0.5672.63 allowed an attacker who convinced a user to install a malicious extension to bypass file access checks via a crafted HTML page. (Chromium security severity: Medium)","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.09011,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1419732","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1419732","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398"],"published_time":"2023-05-03T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2461","summary":"Use after free in OS Inputs in Google Chrome on ChromeOS prior to 113.0.5672.63 allowed a remote attacker who convinced a user to enage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00556,"ranking_epss":0.68193,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1350561","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1350561","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398"],"published_time":"2023-05-03T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2462","summary":"Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to obfuscate main origin data via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00303,"ranking_epss":0.53646,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1375133","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1375133","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398"],"published_time":"2023-05-03T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2463","summary":"Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 113.0.5672.63 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00303,"ranking_epss":0.53646,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1406120","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1406120","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398"],"published_time":"2023-05-03T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2464","summary":"Inappropriate implementation in PictureInPicture in Google Chrome prior to 113.0.5672.63 allowed an attacker who convinced a user to install a malicious extension to perform an origin spoof in the security UI via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00184,"ranking_epss":0.40177,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1418549","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1418549","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398"],"published_time":"2023-05-03T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2465","summary":"Inappropriate implementation in CORS in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0026,"ranking_epss":0.49372,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1399862","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1399862","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398"],"published_time":"2023-05-03T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2466","summary":"Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00303,"ranking_epss":0.53646,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1385714","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1385714","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398"],"published_time":"2023-05-03T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2467","summary":"Inappropriate implementation in Prompts in Google Chrome on Android prior to 113.0.5672.63 allowed a remote attacker to bypass permissions restrictions via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08582,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1413586","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1413586","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398"],"published_time":"2023-05-03T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2468","summary":"Inappropriate implementation in PictureInPicture in Google Chrome prior to 113.0.5672.63 allowed a remote attacker who had compromised the renderer process to obfuscate the security UI via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00303,"ranking_epss":0.53646,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1416380","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1416380","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398"],"published_time":"2023-05-03T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2459","summary":"Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to bypass permission restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10379,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1423304","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398","https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html","https://crbug.com/1423304","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5398"],"published_time":"2023-05-03T00:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-30944","summary":"The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.","cvss":5.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.6,"cvss_v4":null,"epss":0.01357,"ranking_epss":0.80161,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187","https://bugzilla.redhat.com/show_bug.cgi?id=2188606","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/","https://moodle.org/mod/forum/discuss.php?d=446286","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187","https://bugzilla.redhat.com/show_bug.cgi?id=2188606","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/","https://moodle.org/mod/forum/discuss.php?d=446286"],"published_time":"2023-05-02T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-30943","summary":"The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.17058,"ranking_epss":0.95002,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77718","https://bugzilla.redhat.com/show_bug.cgi?id=2188605","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/","https://moodle.org/mod/forum/discuss.php?d=446285","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77718","https://bugzilla.redhat.com/show_bug.cgi?id=2188605","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/","https://moodle.org/mod/forum/discuss.php?d=446285"],"published_time":"2023-05-02T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1786","summary":"Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10054,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugs.launchpad.net/cloud-init/+bug/2013967","https://github.com/canonical/cloud-init/commit/a378b7e4f47375458651c0972e7cd813f6fe0a6b","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ATBJSXPL2IOAD2LDQRKWPLIC7QXS44GZ/","https://ubuntu.com/security/notices/USN-6042-1","https://bugs.launchpad.net/cloud-init/+bug/2013967","https://github.com/canonical/cloud-init/commit/a378b7e4f47375458651c0972e7cd813f6fe0a6b","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ATBJSXPL2IOAD2LDQRKWPLIC7QXS44GZ/","https://ubuntu.com/security/notices/USN-6042-1"],"published_time":"2023-04-26T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29007","summary":"Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00825,"ranking_epss":0.74502,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/git/git/blob/9ce9dea4e1c2419cca126d29fa7730baa078a11b/Documentation/RelNotes/2.30.9.txt","https://github.com/git/git/commit/528290f8c61222433a8cf02fb7cfffa8438432b4","https://github.com/git/git/security/advisories/GHSA-v48j-4xgg-4844","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/","https://security.gentoo.org/glsa/202312-15","https://github.com/git/git/blob/9ce9dea4e1c2419cca126d29fa7730baa078a11b/Documentation/RelNotes/2.30.9.txt","https://github.com/git/git/commit/528290f8c61222433a8cf02fb7cfffa8438432b4","https://github.com/git/git/security/advisories/GHSA-v48j-4xgg-4844","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/","https://security.gentoo.org/glsa/202312-15"],"published_time":"2023-04-25T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2269","summary":"A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00024,"ranking_epss":0.06392,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63AJUCJTZCII2JMAF7MGZEM66KY7IALT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBLBKW2WM5YSTS6OGEU5SYHXSJ5EWSTV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IXHBLWYNSUBS77TYPOJTADPDXKBH2F4U/","https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV%40redhat.com/t/","https://security.netapp.com/advisory/ntap-20230929-0004/","https://www.debian.org/security/2023/dsa-5448","https://www.debian.org/security/2023/dsa-5480","https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63AJUCJTZCII2JMAF7MGZEM66KY7IALT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBLBKW2WM5YSTS6OGEU5SYHXSJ5EWSTV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IXHBLWYNSUBS77TYPOJTADPDXKBH2F4U/","https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV%40redhat.com/t/","https://security.netapp.com/advisory/ntap-20230929-0004/","https://www.debian.org/security/2023/dsa-5448","https://www.debian.org/security/2023/dsa-5480"],"published_time":"2023-04-25T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-25652","summary":"Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch). A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid using `git apply` with `--reject` when applying patches from an untrusted source. Use `git apply --stat` to inspect a patch before applying; avoid applying one that create a conflict where a link corresponding to the `*.rej` file exists.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01801,"ranking_epss":0.8283,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/04/25/2","https://github.com/git/git/commit/18e2b1cfc80990719275d7b08e6e50f3e8cbc902","https://github.com/git/git/commit/668f2d53613ac8fd373926ebe219f2c29112d93e","https://github.com/git/git/security/advisories/GHSA-2hvf-7c8p-28fx","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BSXOGVVBJLYX26IAYX6PJSYQB36BREWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/","https://security.gentoo.org/glsa/202312-15","http://www.openwall.com/lists/oss-security/2023/04/25/2","https://github.com/git/git/commit/18e2b1cfc80990719275d7b08e6e50f3e8cbc902","https://github.com/git/git/commit/668f2d53613ac8fd373926ebe219f2c29112d93e","https://github.com/git/git/security/advisories/GHSA-2hvf-7c8p-28fx","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BSXOGVVBJLYX26IAYX6PJSYQB36BREWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/","https://security.gentoo.org/glsa/202312-15"],"published_time":"2023-04-25T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-25815","summary":"In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\\mingw64\\share\\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\\` (and since `C:\\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.\n\nThis vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\\`.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00099,"ranking_epss":0.27498,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/04/25/2","https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack","https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1","https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8","https://github.com/msys2/MINGW-packages/pull/10461","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/","https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html","https://security.gentoo.org/glsa/202312-15","http://www.openwall.com/lists/oss-security/2023/04/25/2","https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack","https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1","https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8","https://github.com/msys2/MINGW-packages/pull/10461","https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/","https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html","https://security.gentoo.org/glsa/202312-15"],"published_time":"2023-04-25T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42335","summary":"x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00077,"ranking_epss":0.2291,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/04/25/1","http://xenbits.xen.org/xsa/advisory-430.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/","https://security.gentoo.org/glsa/202402-07","https://xenbits.xenproject.org/xsa/advisory-430.txt","http://www.openwall.com/lists/oss-security/2023/04/25/1","http://xenbits.xen.org/xsa/advisory-430.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSPFWSY6UOPGMADQGOGN2PAAS5LJRPTG/","https://security.gentoo.org/glsa/202402-07","https://xenbits.xenproject.org/xsa/advisory-430.txt"],"published_time":"2023-04-25T13:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29530","summary":"Laminas Diactoros provides PSR HTTP Message implementations. In versions 2.18.0 and prior, 2.19.0, 2.20.0, 2.21.0, 2.22.0, 2.23.0, 2.24.0, and 2.25.0, users who create HTTP requests or responses using laminas/laminas-diactoros, when providing a newline at the start or end of a header key or value, can cause an invalid message. This can lead to denial of service vectors or application errors. The problem has been patched in following versions 2.18.1, 2.19.1, 2.20.1, 2.21.1, 2.22.1, 2.23.1, 2.24.1, and 2.25.1. As a workaround, validate HTTP header keys and/or values, and if using user-supplied values, filter them to strip off leading or trailing newline characters before calling `withHeader()`.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00239,"ranking_epss":0.47053,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/advisories/GHSA-wxmh-65f7-jcvw","https://github.com/laminas/laminas-diactoros/security/advisories/GHSA-xv3h-4844-9h36","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPW54QK7ISDALPLP2CKODU4ZIVRYS336/","https://github.com/advisories/GHSA-wxmh-65f7-jcvw","https://github.com/laminas/laminas-diactoros/security/advisories/GHSA-xv3h-4844-9h36","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPW54QK7ISDALPLP2CKODU4ZIVRYS336/"],"published_time":"2023-04-24T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-31084","summary":"An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":9e-05,"ranking_epss":0.0082,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946","https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/","https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/","https://security.netapp.com/advisory/ntap-20230929-0003/","https://www.debian.org/security/2023/dsa-5448","https://www.debian.org/security/2023/dsa-5480","https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946","https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/","https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/","https://security.netapp.com/advisory/ntap-20230929-0003/","https://www.debian.org/security/2023/dsa-5448","https://www.debian.org/security/2023/dsa-5480"],"published_time":"2023-04-24T06:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2194","summary":"An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace \"data->block[0]\" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.04197,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2188396","https://github.com/torvalds/linux/commit/92fbb6d1296f","https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","https://bugzilla.redhat.com/show_bug.cgi?id=2188396","https://github.com/torvalds/linux/commit/92fbb6d1296f","https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"],"published_time":"2023-04-20T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2133","summary":"Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00677,"ranking_epss":0.71542,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html","https://crbug.com/1429197","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5393","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html","https://crbug.com/1429197","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5393"],"published_time":"2023-04-19T04:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2134","summary":"Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00677,"ranking_epss":0.71542,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html","https://crbug.com/1429201","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5393","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html","https://crbug.com/1429201","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5393"],"published_time":"2023-04-19T04:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2135","summary":"Use after free in DevTools in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who convinced a user to enable specific preconditions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00505,"ranking_epss":0.66242,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html","https://crbug.com/1424337","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5393","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html","https://crbug.com/1424337","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5393"],"published_time":"2023-04-19T04:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2136","summary":"Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00572,"ranking_epss":0.68716,"kev":true,"propose_action":"Google Chromium Skia contains an integer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html","https://crbug.com/1432603","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5393","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html","https://crbug.com/1432603","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5393","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-2136"],"published_time":"2023-04-19T04:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2137","summary":"Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00455,"ranking_epss":0.6388,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html","https://crbug.com/1430644","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5393","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html","https://crbug.com/1430644","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5393"],"published_time":"2023-04-19T04:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-27043","summary":"The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00175,"ranking_epss":0.39069,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://python.org","https://github.com/python/cpython/issues/102988","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/","https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html","https://security.netapp.com/advisory/ntap-20230601-0003/","http://python.org","http://seclists.org/fulldisclosure/2025/Apr/8","https://github.com/python/cpython/issues/102988","https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html","https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/","https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html","https://security.netapp.com/advisory/ntap-20230601-0003/"],"published_time":"2023-04-19T00:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28856","summary":"Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00444,"ranking_epss":0.63396,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c","https://github.com/redis/redis/pull/11149","https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6","https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/","https://security.netapp.com/advisory/ntap-20230601-0007/","https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c","https://github.com/redis/redis/pull/11149","https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6","https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/","https://security.netapp.com/advisory/ntap-20230601-0007/"],"published_time":"2023-04-18T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21962","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00119,"ranking_epss":0.30887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21945","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00119,"ranking_epss":0.30887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21946","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44391,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21947","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).  Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.3062,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21953","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.3062,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21955","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00119,"ranking_epss":0.30887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21933","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00119,"ranking_epss":0.30887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21935","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00119,"ranking_epss":0.30887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21940","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).  Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00119,"ranking_epss":0.30887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21919","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.3062,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21920","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.3062,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21929","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00138,"ranking_epss":0.3379,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21911","summary":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.3062,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","https://security.netapp.com/advisory/ntap-20230427-0007/","https://www.oracle.com/security-alerts/cpuapr2023.html"],"published_time":"2023-04-18T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29197","summary":"guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\\n) into both the header names and values. While the specification states that \\r\\n\\r\\n is used to terminate the header list, many servers in the wild will also accept \\n\\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.02291,"ranking_epss":0.84734,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-24775","https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96","https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw","https://lists.debian.org/debian-lts-announce/2023/12/msg00028.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJANWDXJZE5BGLN4MQ4FEHV5LJ6CMKQF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O35UN4IK6VS2LXSRWUDFWY7NI73RKY2U/","https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4","https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-24775","https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96","https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw","https://lists.debian.org/debian-lts-announce/2023/12/msg00028.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJANWDXJZE5BGLN4MQ4FEHV5LJ6CMKQF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O35UN4IK6VS2LXSRWUDFWY7NI73RKY2U/","https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4"],"published_time":"2023-04-17T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43612","summary":"In lldpd before 1.0.13, when decoding SONMP packets in the sonmp_decode function, it's possible to trigger an out-of-bounds heap read via short SONMP packets.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00133,"ranking_epss":0.32818,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/lldpd/lldpd/commit/73d42680fce8598324364dbb31b9bc3b8320adf7","https://github.com/lldpd/lldpd/compare/1.0.12...1.0.13","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3T5XHPOGIPWCRRPJUE6P3HVC5PTSD5JS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYA4AMJXCNF6UPFG36L2TPPT32C242SP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKQWHG2SZJZSGC7PXVDAEJYBN7ESDR7D/","https://lldpd.github.io/security.html","https://github.com/lldpd/lldpd/commit/73d42680fce8598324364dbb31b9bc3b8320adf7","https://github.com/lldpd/lldpd/compare/1.0.12...1.0.13","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3T5XHPOGIPWCRRPJUE6P3HVC5PTSD5JS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYA4AMJXCNF6UPFG36L2TPPT32C242SP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKQWHG2SZJZSGC7PXVDAEJYBN7ESDR7D/","https://lldpd.github.io/security.html"],"published_time":"2023-04-15T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-2033","summary":"Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.25181,"ranking_epss":0.96197,"kev":true,"propose_action":"Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_14.html","https://crbug.com/1432210","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.couchbase.com/alerts/","https://www.debian.org/security/2023/dsa-5390","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_14.html","https://crbug.com/1432210","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/","https://security.gentoo.org/glsa/202309-17","https://www.couchbase.com/alerts/","https://www.debian.org/security/2023/dsa-5390","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-2033"],"published_time":"2023-04-14T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1994","summary":"GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00286,"ranking_epss":0.52137,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json","https://gitlab.com/wireshark/wireshark/-/issues/18947","https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/","https://security.gentoo.org/glsa/202309-02","https://www.debian.org/security/2023/dsa-5429","https://www.wireshark.org/security/wnpa-sec-2023-11.html","https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json","https://gitlab.com/wireshark/wireshark/-/issues/18947","https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/","https://security.gentoo.org/glsa/202309-02","https://www.debian.org/security/2023/dsa-5429","https://www.wireshark.org/security/wnpa-sec-2023-11.html"],"published_time":"2023-04-12T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1906","summary":"A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10509,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-1906","https://bugzilla.redhat.com/show_bug.cgi?id=2185714","https://github.com/ImageMagick/ImageMagick/commit/d7a8bdd7bb33cf8e58bc01b4a4f2ea5466f8c6b3","https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-35q2-86c7-9247","https://github.com/ImageMagick/ImageMagick6/commit/e30c693b37c3b41723f1469d1226a2c814ca443d","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6655G3GPS42WQM32DJHUCZALI2URQSCO/","https://access.redhat.com/security/cve/CVE-2023-1906","https://bugzilla.redhat.com/show_bug.cgi?id=2185714","https://github.com/ImageMagick/ImageMagick/commit/d7a8bdd7bb33cf8e58bc01b4a4f2ea5466f8c6b3","https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-35q2-86c7-9247","https://github.com/ImageMagick/ImageMagick6/commit/e30c693b37c3b41723f1469d1226a2c814ca443d","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6655G3GPS42WQM32DJHUCZALI2URQSCO/"],"published_time":"2023-04-12T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1993","summary":"LISP dissector large loop in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00259,"ranking_epss":0.49313,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json","https://gitlab.com/wireshark/wireshark/-/issues/18900","https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/","https://security.gentoo.org/glsa/202309-02","https://www.debian.org/security/2023/dsa-5429","https://www.wireshark.org/security/wnpa-sec-2023-10.html","https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json","https://gitlab.com/wireshark/wireshark/-/issues/18900","https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/","https://security.gentoo.org/glsa/202309-02","https://www.debian.org/security/2023/dsa-5429","https://www.wireshark.org/security/wnpa-sec-2023-10.html"],"published_time":"2023-04-12T21:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1992","summary":"RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00299,"ranking_epss":0.53297,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json","https://gitlab.com/wireshark/wireshark/-/issues/18852","https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/","https://security.gentoo.org/glsa/202309-02","https://www.debian.org/security/2023/dsa-5429","https://www.wireshark.org/security/wnpa-sec-2023-09.html","https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json","https://gitlab.com/wireshark/wireshark/-/issues/18852","https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/","https://security.gentoo.org/glsa/202309-02","https://www.debian.org/security/2023/dsa-5429","https://www.wireshark.org/security/wnpa-sec-2023-09.html"],"published_time":"2023-04-12T21:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-0004","summary":"A local file deletion vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to delete files from the local file system with elevated privileges.\n\nThese files can include logs and system components that impact the integrity and availability of PAN-OS software.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01298,"ranking_epss":0.79741,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","https://security.paloaltonetworks.com/CVE-2023-0004","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","https://security.paloaltonetworks.com/CVE-2023-0004"],"published_time":"2023-04-12T17:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1810","summary":"Heap buffer overflow in Visuals in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00809,"ranking_epss":0.74257,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1414018","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1414018","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1811","summary":"Use after free in Frames in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00534,"ranking_epss":0.67454,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1420510","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1420510","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1812","summary":"Out of bounds memory access in DOM Bindings in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00704,"ranking_epss":0.72139,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1418224","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1418224","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1813","summary":"Inappropriate implementation in Extensions in Google Chrome prior to 112.0.5615.49 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18336,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1423258","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1423258","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1814","summary":"Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass download checking via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18528,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1417325","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1417325","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1815","summary":"Use after free in Networking APIs in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00558,"ranking_epss":0.68253,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1278708","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1278708","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1816","summary":"Incorrect security UI in Picture In Picture in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially perform navigation spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00357,"ranking_epss":0.5799,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1413919","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1413919","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1817","summary":"Insufficient policy enforcement in Intents in Google Chrome on Android prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27861,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1418061","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1418061","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1818","summary":"Use after free in Vulkan in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00558,"ranking_epss":0.68253,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1223346","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1223346","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1819","summary":"Out of bounds read in Accessibility in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00239,"ranking_epss":0.47047,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1406588","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1406588","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1820","summary":"Heap buffer overflow in Browser History in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00707,"ranking_epss":0.72204,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1408120","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1408120","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1821","summary":"Inappropriate implementation in WebShare in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00298,"ranking_epss":0.5323,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1413618","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1413618","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1822","summary":"Incorrect security UI in Navigation in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00508,"ranking_epss":0.66352,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1066555","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1066555","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1823","summary":"Inappropriate implementation in FedCM in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18528,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1406900","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386","https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","https://crbug.com/1406900","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://security.gentoo.org/glsa/202309-17","https://www.debian.org/security/2023/dsa-5386"],"published_time":"2023-04-04T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-26916","summary":"libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer dereference via the function lys_parse_mem at lys_parse_mem.c.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0005,"ranking_epss":0.15436,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/CESNET/libyang/issues/1979","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6NQZHCJG3SBMFOQNIPRZGKDK3ARHLTTB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2VWGCMYKQH4BTFEHX5VYEXXOPIKKFHS/","https://github.com/CESNET/libyang/issues/1979","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6NQZHCJG3SBMFOQNIPRZGKDK3ARHLTTB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2VWGCMYKQH4BTFEHX5VYEXXOPIKKFHS/"],"published_time":"2023-04-03T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1611","summary":"A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":8e-05,"ranking_epss":0.00751,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2181342","https://github.com/torvalds/linux/commit/2f1a6be12ab6c8470d5776e68644726c94257c54","https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5QCM6XO4HSPLGR3DFYWFRIA3GCBIHZR4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWECAZ7V7EPSXMINO6Q6KWNKDY2CO6ZW/","https://lore.kernel.org/linux-btrfs/35b9a70650ea947387cf352914a8774b4f7e8a6f.1679481128.git.fdmanana%40suse.com/","https://bugzilla.redhat.com/show_bug.cgi?id=2181342","https://github.com/torvalds/linux/commit/2f1a6be12ab6c8470d5776e68644726c94257c54","https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5QCM6XO4HSPLGR3DFYWFRIA3GCBIHZR4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWECAZ7V7EPSXMINO6Q6KWNKDY2CO6ZW/","https://lore.kernel.org/linux-btrfs/35b9a70650ea947387cf352914a8774b4f7e8a6f.1679481128.git.fdmanana%40suse.com/"],"published_time":"2023-04-03T22:15:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-36440","summary":"A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the peek_for_as4_capability function. Attackers can maliciously construct BGP open packets and send them to BGP peers running frr-bgpd, resulting in DoS.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00255,"ranking_epss":0.48887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/spwpun/pocs","https://github.com/spwpun/pocs/blob/main/frr-bgpd.md","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HU4PKLUVB5CTMOVQ2GV33TNUNMJCBGD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBXEXL2ZQBWCBLNUP6P67FHECXQWSK3L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GM66PNHGCXZU66LQCTP2FSJLFF6CVMSI/","https://www.debian.org/security/2023/dsa-5495","https://github.com/spwpun/pocs","https://github.com/spwpun/pocs/blob/main/frr-bgpd.md","https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HU4PKLUVB5CTMOVQ2GV33TNUNMJCBGD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBXEXL2ZQBWCBLNUP6P67FHECXQWSK3L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GM66PNHGCXZU66LQCTP2FSJLFF6CVMSI/","https://www.debian.org/security/2023/dsa-5495"],"published_time":"2023-04-03T16:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29141","summary":"An issue was discovered in MediaWiki before 1.35.10, 1.36.x through 1.38.x before 1.38.6, and 1.39.x before 1.39.3. An auto-block can occur for an untrusted X-Forwarded-For header.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00292,"ranking_epss":0.52609,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_39/RELEASE-NOTES-1.39","https://lists.debian.org/debian-lts-announce/2023/08/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ONWHGOBFD6CQAEGOP5O375XAP2N6RUHT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGK4NZPIJ5ET2ANRZOUYPCRIB5I64JR7/","https://phabricator.wikimedia.org/T285159","https://www.debian.org/security/2023/dsa-5447","https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_39/RELEASE-NOTES-1.39","https://lists.debian.org/debian-lts-announce/2023/08/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ONWHGOBFD6CQAEGOP5O375XAP2N6RUHT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGK4NZPIJ5ET2ANRZOUYPCRIB5I64JR7/","https://phabricator.wikimedia.org/T285159","https://www.debian.org/security/2023/dsa-5447","https://phabricator.wikimedia.org/T285159"],"published_time":"2023-03-31T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28755","summary":"A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00366,"ranking_epss":0.58615,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/ruby/uri/releases/","https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27LUWREIFTP3MQAW7QE4PJM4DPAQJWXF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFZANOQA4RYX7XCB42OO3P24DQKWHEKA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G76GZG3RAGYF4P75YY7J7TGYAU7Z5E2T/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QA6XUKUY7B5OLNQBLHOT43UW7C5NIOQQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/","https://security.gentoo.org/glsa/202401-27","https://security.netapp.com/advisory/ntap-20230526-0003/","https://www.ruby-lang.org/en/downloads/releases/","https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/","https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/","https://github.com/ruby/uri/releases/","https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00000.html","https://lists.debian.org/debian-lts-announce/2025/05/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27LUWREIFTP3MQAW7QE4PJM4DPAQJWXF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFZANOQA4RYX7XCB42OO3P24DQKWHEKA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G76GZG3RAGYF4P75YY7J7TGYAU7Z5E2T/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QA6XUKUY7B5OLNQBLHOT43UW7C5NIOQQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27LUWREIFTP3MQAW7QE4PJM4DPAQJWXF/","https://security.gentoo.org/glsa/202401-27","https://security.netapp.com/advisory/ntap-20230526-0003/","https://www.ruby-lang.org/en/downloads/releases/","https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/","https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/"],"published_time":"2023-03-31T04:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28756","summary":"A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00707,"ranking_epss":0.72211,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/ruby/time/releases/","https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFZANOQA4RYX7XCB42OO3P24DQKWHEKA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G76GZG3RAGYF4P75YY7J7TGYAU7Z5E2T/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/","https://security.gentoo.org/glsa/202401-27","https://security.netapp.com/advisory/ntap-20230526-0004/","https://www.ruby-lang.org/en/downloads/releases/","https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/","https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/","https://github.com/ruby/time/releases/","https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFZANOQA4RYX7XCB42OO3P24DQKWHEKA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G76GZG3RAGYF4P75YY7J7TGYAU7Z5E2T/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/","https://security.gentoo.org/glsa/202401-27","https://security.netapp.com/advisory/ntap-20230526-0004/","https://www.ruby-lang.org/en/downloads/releases/","https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/","https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"],"published_time":"2023-03-31T04:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1393","summary":"A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00093,"ranking_epss":0.26007,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/","https://security.gentoo.org/glsa/202305-30","https://www.openwall.com/lists/oss-security/2023/03/29/1","https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/","https://security.gentoo.org/glsa/202305-30","https://www.openwall.com/lists/oss-security/2023/03/29/1"],"published_time":"2023-03-30T21:15:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-27533","summary":"A vulnerability in input validation exists in curl <8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \"telnet options\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00216,"ranking_epss":0.4427,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/1891474","https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230420-0011/","https://hackerone.com/reports/1891474","https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230420-0011/"],"published_time":"2023-03-30T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-27534","summary":"A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00064,"ranking_epss":0.19887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/1892351","https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230420-0012/","https://hackerone.com/reports/1892351","https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230420-0012/"],"published_time":"2023-03-30T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-27535","summary":"An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00065,"ranking_epss":0.20231,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/1892780","https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230420-0010/","https://hackerone.com/reports/1892780","https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230420-0010/"],"published_time":"2023-03-30T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-27536","summary":"An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00011,"ranking_epss":0.01295,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/1895135","https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230420-0010/","https://hackerone.com/reports/1895135","https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230420-0010/"],"published_time":"2023-03-30T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-27538","summary":"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05559,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/1898475","https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230420-0010/","https://hackerone.com/reports/1898475","https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230420-0010/"],"published_time":"2023-03-30T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-26116","summary":"Versions of the package angular from 1.2.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00318,"ranking_epss":0.54914,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K/","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406322","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406321","https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044","https://stackblitz.com/edit/angularjs-vulnerability-angular-copy-redos","https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K/","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406322","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406321","https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044","https://stackblitz.com/edit/angularjs-vulnerability-angular-copy-redos"],"published_time":"2023-03-30T05:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-26117","summary":"Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00318,"ranking_epss":0.54914,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K/","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324","https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045","https://stackblitz.com/edit/angularjs-vulnerability-resource-trailing-slashes-redos","https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K/","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324","https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045","https://stackblitz.com/edit/angularjs-vulnerability-resource-trailing-slashes-redos"],"published_time":"2023-03-30T05:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-26118","summary":"Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type=\"url\"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0061,"ranking_epss":0.69803,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K/","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327","https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046","https://stackblitz.com/edit/angularjs-vulnerability-inpur-url-validation-redos","https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDKFLKJ6VZKL52AFVW2OVZRMJWHMW55K/","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328","https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327","https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046","https://stackblitz.com/edit/angularjs-vulnerability-inpur-url-validation-redos"],"published_time":"2023-03-30T05:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-0664","summary":"A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.06029,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2167423","https://gitlab.com/qemu-project/qemu/-/commit/07ce178a2b0768eb9e712bb5ad0cf6dc7fcf0158","https://gitlab.com/qemu-project/qemu/-/commit/88288c2a51faa7c795f053fc8b31b1c16ff804c5","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SEOC7SRJWLZSXCND2ADFW6C76ZMTZLE4/","https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg01445.html","https://security.netapp.com/advisory/ntap-20230517-0005/","https://bugzilla.redhat.com/show_bug.cgi?id=2167423","https://gitlab.com/qemu-project/qemu/-/commit/07ce178a2b0768eb9e712bb5ad0cf6dc7fcf0158","https://gitlab.com/qemu-project/qemu/-/commit/88288c2a51faa7c795f053fc8b31b1c16ff804c5","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SEOC7SRJWLZSXCND2ADFW6C76ZMTZLE4/","https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg01445.html","https://security.netapp.com/advisory/ntap-20230517-0005/"],"published_time":"2023-03-29T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28447","summary":"Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00742,"ranking_epss":0.73008,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d","https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/","https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d","https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj","https://lists.debian.org/debian-lts-announce/2024/11/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/"],"published_time":"2023-03-28T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-0179","summary":"A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00557,"ranking_epss":0.68234,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html","https://bugzilla.redhat.com/show_bug.cgi?id=2161713","https://seclists.org/oss-sec/2023/q1/20","https://security.netapp.com/advisory/ntap-20230511-0003/","http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html","https://bugzilla.redhat.com/show_bug.cgi?id=2161713","https://seclists.org/oss-sec/2023/q1/20","https://security.netapp.com/advisory/ntap-20230511-0003/"],"published_time":"2023-03-27T22:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-0494","summary":"A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00711,"ranking_epss":0.72304,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2165995","https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec","https://lists.x.org/archives/xorg-announce/2023-February/003320.html","https://security.gentoo.org/glsa/202305-30","https://bugzilla.redhat.com/show_bug.cgi?id=2165995","https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec","https://lists.x.org/archives/xorg-announce/2023-February/003320.html","https://security.gentoo.org/glsa/202305-30"],"published_time":"2023-03-27T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1073","summary":"A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.05897,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/11/05/2","http://www.openwall.com/lists/oss-security/2023/11/05/3","https://bugzilla.redhat.com/show_bug.cgi?id=2173403","https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456","https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","https://www.openwall.com/lists/osssecurity/2023/01/17/3","http://www.openwall.com/lists/oss-security/2023/11/05/2","http://www.openwall.com/lists/oss-security/2023/11/05/3","https://bugzilla.redhat.com/show_bug.cgi?id=2173403","https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456","https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","https://www.openwall.com/lists/osssecurity/2023/01/17/3"],"published_time":"2023-03-27T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-3923","summary":"A flaw was found in the Linux kernel's implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.","cvss":2.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.3,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.03265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2019643","https://lore.kernel.org/all/20220204100036.GA12348%40kili/","https://bugzilla.redhat.com/show_bug.cgi?id=2019643","https://lore.kernel.org/all/20220204100036.GA12348%40kili/"],"published_time":"2023-03-27T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28686","summary":"Dino before 0.2.3, 0.3.x before 0.3.2, and 0.4.x before 0.4.2 allows attackers to modify the personal bookmark store via a crafted message. The attacker can change the display of group chats or force a victim to join a group chat; the victim may then be tricked into disclosing sensitive information.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00216,"ranking_epss":0.44286,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://dino.im/security/cve-2023-28686/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQLCEUZS5GPHUQMS7C6W2NS3PHYUFHYF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GOH6NYTLPM52MDIR2IRVUR3REDVWZV6N/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IIWXAK656EHSRIRUHLPBE3AX2I4TMH7M/","https://www.debian.org/security/2023/dsa-5379","https://dino.im/security/cve-2023-28686/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQLCEUZS5GPHUQMS7C6W2NS3PHYUFHYF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GOH6NYTLPM52MDIR2IRVUR3REDVWZV6N/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IIWXAK656EHSRIRUHLPBE3AX2I4TMH7M/","https://www.debian.org/security/2023/dsa-5379"],"published_time":"2023-03-24T04:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28333","summary":"The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0102,"ranking_epss":0.77263,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2179422","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/","https://moodle.org/mod/forum/discuss.php?d=445065","https://bugzilla.redhat.com/show_bug.cgi?id=2179422","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/","https://moodle.org/mod/forum/discuss.php?d=445065"],"published_time":"2023-03-23T21:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28336","summary":"Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00407,"ranking_epss":0.61147,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2179426","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/","https://moodle.org/mod/forum/discuss.php?d=445068","https://bugzilla.redhat.com/show_bug.cgi?id=2179426","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/","https://moodle.org/mod/forum/discuss.php?d=445068"],"published_time":"2023-03-23T21:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-0056","summary":"An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00192,"ranking_epss":0.41197,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-0056","https://access.redhat.com/security/cve/CVE-2023-0056"],"published_time":"2023-03-23T21:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1513","summary":"A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00024,"ranking_epss":0.06471,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2179892","https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952","https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh%40linuxfoundation.org/","https://bugzilla.redhat.com/show_bug.cgi?id=2179892","https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952","https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh%40linuxfoundation.org/"],"published_time":"2023-03-23T21:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1289","summary":"A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in \"/tmp,\" resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27805,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2176858","https://github.com/ImageMagick/ImageMagick/commit/c5b23cbf2119540725e6dc81f4deb25798ead6a4","https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr","https://lists.debian.org/debian-lts-announce/2024/02/msg00007.html","https://bugzilla.redhat.com/show_bug.cgi?id=2176858","https://github.com/ImageMagick/ImageMagick/commit/c5b23cbf2119540725e6dc81f4deb25798ead6a4","https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr","https://lists.debian.org/debian-lts-announce/2024/02/msg00007.html"],"published_time":"2023-03-23T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1544","summary":"A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.","cvss":6.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.0,"cvss_v4":null,"epss":0.00061,"ranking_epss":0.19049,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-1544","https://bugzilla.redhat.com/show_bug.cgi?id=2180364","https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html","https://security.netapp.com/advisory/ntap-20230511-0005/","https://access.redhat.com/security/cve/CVE-2023-1544","https://bugzilla.redhat.com/show_bug.cgi?id=2180364","https://lists.debian.org/debian-lts-announce/2025/04/msg00042.html","https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html","https://security.netapp.com/advisory/ntap-20230511-0005/"],"published_time":"2023-03-23T20:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28439","summary":"CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability has been discovered affecting Iframe Dialog and Media Embed packages. The vulnerability may trigger a JavaScript code after fulfilling special conditions: using one of the affected packages on a web page with missing proper Content Security Policy configuration; initializing the editor on an element and using an element other than `<textarea>` as a base; and destroying the editor instance. This vulnerability might affect a small percentage of integrators that depend on dynamic editor initialization/destroy mechanism.\n\nA fix is available in CKEditor4 version 4.21.0. In some rare cases, a security fix may be considered a breaking change. Starting from version 4.21.0, the Iframe Dialog plugin applies the `sandbox` attribute by default, which restricts JavaScript code execution in the iframe element. To change this behavior, configure the `config.iframe_attributes` option. Also starting from version 4.21.0, the Media Embed plugin regenerates the entire content of the embed widget by default. To change this behavior, configure the `config.embed_keepOriginalContent` option. Those who choose to enable either of the more permissive options or who cannot upgrade to a patched version should properly configure Content Security Policy to avoid any potential security issues that may arise from embedding iframe elements on their web page.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.0036,"ranking_epss":0.58229,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://ckeditor.com/cke4/addon/embed","https://ckeditor.com/cke4/addon/iframe","https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-vh5c-xwqv-cv9g","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWKG2VCPJNETVCDTXU4X6FQ2PO6XCNGN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4ODGOW6PYVOXHQSMWJBOCE6DXWAI33W/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCYKD3JZWWA3ESOZG4PHJJEXT4EYIUIQ/","https://ckeditor.com/cke4/addon/embed","https://ckeditor.com/cke4/addon/iframe","https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-vh5c-xwqv-cv9g","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWKG2VCPJNETVCDTXU4X6FQ2PO6XCNGN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4ODGOW6PYVOXHQSMWJBOCE6DXWAI33W/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCYKD3JZWWA3ESOZG4PHJJEXT4EYIUIQ/"],"published_time":"2023-03-22T21:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1528","summary":"Use after free in Passwords in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00516,"ranking_epss":0.66728,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1421773","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17","https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1421773","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17"],"published_time":"2023-03-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1529","summary":"Out of bounds memory access in WebHID in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a malicious HID device. (Chromium security severity: High)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00356,"ranking_epss":0.57927,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1419718","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17","https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1419718","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17"],"published_time":"2023-03-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1530","summary":"Use after free in PDF in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00458,"ranking_epss":0.64044,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1419831","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17","https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1419831","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17"],"published_time":"2023-03-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1531","summary":"Use after free in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00876,"ranking_epss":0.75335,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1415330","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17","https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1724","https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1415330","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17","https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1724"],"published_time":"2023-03-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1532","summary":"Out of bounds read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00596,"ranking_epss":0.69376,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/171959/Chrome-media-mojom-VideoFrame-Missing-Validation.html","https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1421268","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17","http://packetstormsecurity.com/files/171959/Chrome-media-mojom-VideoFrame-Missing-Validation.html","https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1421268","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17"],"published_time":"2023-03-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1533","summary":"Use after free in WebProtect in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00419,"ranking_epss":0.61927,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1422183","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17","https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1422183","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17"],"published_time":"2023-03-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1534","summary":"Out of bounds read in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00403,"ranking_epss":0.60889,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/171961/Chrome-GL_ShaderBinary-Untrusted-Process-Exposure.html","http://packetstormsecurity.com/files/171965/Chrome-SpvGetMappedSamplerName-Out-Of-Bounds-String-Copy.html","https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1422594","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17","http://packetstormsecurity.com/files/171961/Chrome-GL_ShaderBinary-Untrusted-Process-Exposure.html","http://packetstormsecurity.com/files/171965/Chrome-SpvGetMappedSamplerName-Out-Of-Bounds-String-Copy.html","https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html","https://crbug.com/1422594","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/","https://security.gentoo.org/glsa/202309-17"],"published_time":"2023-03-21T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42333","summary":"x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.0051,"ranking_epss":0.6644,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/03/21/2","http://xenbits.xen.org/xsa/advisory-428.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2023/dsa-5378","https://xenbits.xenproject.org/xsa/advisory-428.txt","http://www.openwall.com/lists/oss-security/2023/03/21/2","http://xenbits.xen.org/xsa/advisory-428.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2023/dsa-5378","https://xenbits.xenproject.org/xsa/advisory-428.txt"],"published_time":"2023-03-21T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42334","summary":"x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18468,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/03/21/2","http://xenbits.xen.org/xsa/advisory-428.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2023/dsa-5378","https://xenbits.xenproject.org/xsa/advisory-428.txt","http://www.openwall.com/lists/oss-security/2023/03/21/2","http://xenbits.xen.org/xsa/advisory-428.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2023/dsa-5378","https://xenbits.xenproject.org/xsa/advisory-428.txt"],"published_time":"2023-03-21T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42331","summary":"x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00056,"ranking_epss":0.17423,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/03/21/3","http://xenbits.xen.org/xsa/advisory-429.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2023/dsa-5378","https://xenbits.xenproject.org/xsa/advisory-429.txt","http://www.openwall.com/lists/oss-security/2023/03/21/3","http://xenbits.xen.org/xsa/advisory-429.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2023/dsa-5378","https://xenbits.xenproject.org/xsa/advisory-429.txt"],"published_time":"2023-03-21T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42332","summary":"x86 shadow plus log-dirty mode use-after-free In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Shadow mode maintains a pool of memory used for both shadow page tables as well as auxiliary data structures. To migrate or snapshot guests, Xen additionally runs them in so called log-dirty mode. The data structures needed by the log-dirty tracking are part of aformentioned auxiliary data. In order to keep error handling efforts within reasonable bounds, for operations which may require memory allocations shadow mode logic ensures up front that enough memory is available for the worst case requirements. Unfortunately, while page table memory is properly accounted for on the code path requiring the potential establishing of new shadows, demands by the log-dirty infrastructure were not taken into consideration. As a result, just established shadow page tables could be freed again immediately, while other code is still accessing them on the assumption that they would remain allocated.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00058,"ranking_epss":0.18037,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/03/21/1","http://xenbits.xen.org/xsa/advisory-427.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2023/dsa-5378","https://xenbits.xenproject.org/xsa/advisory-427.txt","http://www.openwall.com/lists/oss-security/2023/03/21/1","http://xenbits.xen.org/xsa/advisory-427.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2023/dsa-5378","https://xenbits.xenproject.org/xsa/advisory-427.txt"],"published_time":"2023-03-21T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1264","summary":"NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1392.","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10958,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/vim/vim/commit/7ac5023a5f1a37baafbe1043645f97ba3443d9f6","https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/","https://github.com/vim/vim/commit/7ac5023a5f1a37baafbe1043645f97ba3443d9f6","https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/"],"published_time":"2023-03-07T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4904","summary":"A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00161,"ranking_epss":0.37026,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2168631","https://github.com/c-ares/c-ares/issues/496","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33LDNS6RPOPP36Z4MPWXALUQZXJCWJS2/","https://security.gentoo.org/glsa/202401-02","https://bugzilla.redhat.com/show_bug.cgi?id=2168631","https://github.com/c-ares/c-ares/issues/496","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33LDNS6RPOPP36Z4MPWXALUQZXJCWJS2/","https://security.gentoo.org/glsa/202401-02"],"published_time":"2023-03-06T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-20251","summary":"A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00222,"ranking_epss":0.44872,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=1929800","https://bugzilla.samba.org/show_bug.cgi?id=14611","https://security.gentoo.org/glsa/202309-06","https://security.netapp.com/advisory/ntap-20230331-0005/","https://bugzilla.redhat.com/show_bug.cgi?id=1929800","https://bugzilla.samba.org/show_bug.cgi?id=14611","https://security.gentoo.org/glsa/202309-06","https://security.netapp.com/advisory/ntap-20230331-0005/"],"published_time":"2023-03-06T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41862","summary":"In PostgreSQL, a modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions a server can cause a libpq client to over-read and report an error message containing uninitialized bytes.","cvss":3.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.7,"cvss_v4":null,"epss":0.0032,"ranking_epss":0.55122,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2165722","https://security.netapp.com/advisory/ntap-20230427-0002/","https://www.postgresql.org/support/security/CVE-2022-41862/","https://bugzilla.redhat.com/show_bug.cgi?id=2165722","https://security.netapp.com/advisory/ntap-20230427-0002/","https://www.postgresql.org/support/security/CVE-2022-41862/"],"published_time":"2023-03-03T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4645","summary":"LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01837,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json","https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246","https://gitlab.com/libtiff/libtiff/-/issues/277","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/","https://security.netapp.com/advisory/ntap-20230331-0001/","https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json","https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246","https://gitlab.com/libtiff/libtiff/-/issues/277","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/","https://security.netapp.com/advisory/ntap-20230331-0001/"],"published_time":"2023-03-03T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-25358","summary":"A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00161,"ranking_epss":0.36982,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/04/21/3","https://bugs.webkit.org/show_bug.cgi?id=242683","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/","https://security.gentoo.org/glsa/202305-32","http://www.openwall.com/lists/oss-security/2023/04/21/3","https://bugs.webkit.org/show_bug.cgi?id=242683","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/","https://security.gentoo.org/glsa/202305-32"],"published_time":"2023-03-02T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1127","summary":"Divide By Zero in GitHub repository vim/vim prior to 9.0.1367.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13828,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/vim/vim/commit/e0f869196930ef5f25a0ac41c9215b09c9ce2d3c","https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDVN5HSWPNVP4QXBPCEGZDLZKURLJWTE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ6TMKKBXHGVUHWFGM4X46VIJO7ZAG2W/","https://github.com/vim/vim/commit/e0f869196930ef5f25a0ac41c9215b09c9ce2d3c","https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDVN5HSWPNVP4QXBPCEGZDLZKURLJWTE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ6TMKKBXHGVUHWFGM4X46VIJO7ZAG2W/"],"published_time":"2023-03-01T19:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41727","summary":"An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.0415,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://go.dev/cl/468195","https://go.dev/issue/58003","https://groups.google.com/g/golang-announce/c/ag-FiyjlD5o","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/","https://pkg.go.dev/vuln/GO-2023-1572","https://go.dev/cl/468195","https://go.dev/issue/58003","https://groups.google.com/g/golang-announce/c/ag-FiyjlD5o","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/","https://pkg.go.dev/vuln/GO-2023-1572"],"published_time":"2023-02-28T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-27320","summary":"Sudo before 1.9.13p2 has a double free in the per-command chroot feature.","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.00211,"ranking_epss":0.43615,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/03/01/8","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/332KN4QI6QXB7NI7SWSJ2EQJKWIILFN6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLXMRAMXC3BYL4DNKVTK3V6JDMUXZ7B/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6VW24YGXJYI4NZ5HZPQCF4MCE7766AU/","https://security.gentoo.org/glsa/202309-12","https://security.netapp.com/advisory/ntap-20230413-0009/","https://www.openwall.com/lists/oss-security/2023/02/28/1","https://www.sudo.ws/releases/stable/#1.9.13p2","http://www.openwall.com/lists/oss-security/2023/03/01/8","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/332KN4QI6QXB7NI7SWSJ2EQJKWIILFN6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLXMRAMXC3BYL4DNKVTK3V6JDMUXZ7B/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6VW24YGXJYI4NZ5HZPQCF4MCE7766AU/","https://security.gentoo.org/glsa/202309-12","https://security.netapp.com/advisory/ntap-20230413-0009/","https://www.openwall.com/lists/oss-security/2023/02/28/1","https://www.sudo.ws/releases/stable/#1.9.13p2"],"published_time":"2023-02-28T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-1055","summary":"A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00063,"ranking_epss":0.19682,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI/","https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI/"],"published_time":"2023-02-27T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-23916","summary":"An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \"links\" in this \"decompression chain\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \"malloc bomb\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00092,"ranking_epss":0.2589,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/1826048","https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230309-0006/","https://www.debian.org/security/2023/dsa-5365","https://hackerone.com/reports/1826048","https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230309-0006/","https://www.debian.org/security/2023/dsa-5365"],"published_time":"2023-02-23T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-26081","summary":"In Epiphany (aka GNOME Web) through 43.0, untrusted web content can trick users into exfiltrating passwords, because autofill occurs in sandboxed contexts.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00176,"ranking_epss":0.39096,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x","https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1275","https://lists.debian.org/debian-lts-announce/2023/05/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFWUNG6E4ZT43EYNHKYXS7QVSO2VW2H2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SADQCSQKTJKTTIJMEPY7GII6IVQSKEKV/","https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x","https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1275","https://lists.debian.org/debian-lts-announce/2023/05/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFWUNG6E4ZT43EYNHKYXS7QVSO2VW2H2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SADQCSQKTJKTTIJMEPY7GII6IVQSKEKV/"],"published_time":"2023-02-20T03:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24329","summary":"An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01445,"ranking_epss":0.8078,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/python/cpython/issues/102153","https://github.com/python/cpython/pull/99421","https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/","https://pointernull.com/security/python-url-parse-problem.html","https://security.netapp.com/advisory/ntap-20230324-0004/","https://www.kb.cert.org/vuls/id/127587","https://github.com/python/cpython/issues/102153","https://github.com/python/cpython/pull/99421","https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html","https://lists.debian.org/debian-lts-announce/2024/11/msg00005.html","https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/","https://pointernull.com/security/python-url-parse-problem.html","https://security.netapp.com/advisory/ntap-20230324-0004/","https://www.kb.cert.org/vuls/id/127587"],"published_time":"2023-02-17T15:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-0361","summary":"A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.03615,"ranking_epss":0.87807,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2023-0361","https://github.com/tlsfuzzer/tlsfuzzer/pull/679","https://gitlab.com/gnutls/gnutls/-/issues/1050","https://lists.debian.org/debian-lts-announce/2023/02/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UFIA3X4IZ3CW7SRQ2UHNHNPMRIAWF2FI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS4KVDOG6QTALWHC2QE4Y7VPDRMLTRWQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z634YBXAJ5VLDI62IOPBVP5K6YFHAWCY/","https://security.netapp.com/advisory/ntap-20230324-0005/","https://security.netapp.com/advisory/ntap-20230725-0005/","https://access.redhat.com/security/cve/CVE-2023-0361","https://github.com/tlsfuzzer/tlsfuzzer/pull/679","https://gitlab.com/gnutls/gnutls/-/issues/1050","https://lists.debian.org/debian-lts-announce/2023/02/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UFIA3X4IZ3CW7SRQ2UHNHNPMRIAWF2FI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS4KVDOG6QTALWHC2QE4Y7VPDRMLTRWQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z634YBXAJ5VLDI62IOPBVP5K6YFHAWCY/","https://security.netapp.com/advisory/ntap-20230324-0005/","https://security.netapp.com/advisory/ntap-20230725-0005/"],"published_time":"2023-02-15T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-0003","summary":"A file disclosure vulnerability in the Palo Alto Networks Cortex XSOAR server software enables an authenticated user with access to the web interface to read local files from the server.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01372,"ranking_epss":0.80255,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMEELCREWMRT6NS7HWXLA6XFLLMO36HE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEJWL67XR67JAGEL2ZK22NA3BRKNMZNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKFMKD4MJZIKFQJAAJ4VZ2FHIJ764A76/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","https://security.paloaltonetworks.com/CVE-2023-0003","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMEELCREWMRT6NS7HWXLA6XFLLMO36HE/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEJWL67XR67JAGEL2ZK22NA3BRKNMZNY/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKFMKD4MJZIKFQJAAJ4VZ2FHIJ764A76/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","https://security.paloaltonetworks.com/CVE-2023-0003"],"published_time":"2023-02-08T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46663","summary":"In GNU Less before 609, crafted data can result in \"less -R\" not filtering ANSI escape sequences sent to the terminal.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.27966,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.greenwoodsoftware.com/less/news.609.html","http://www.openwall.com/lists/oss-security/2023/02/07/7","https://github.com/gwsw/less/commit/a78e1351113cef564d790a730d657a321624d79c","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LR7AUWB34JD4PCW3HHASBEDGGHFWPAQP/","https://security.gentoo.org/glsa/202310-11","https://www.openwall.com/lists/oss-security/2023/02/07/7","http://www.greenwoodsoftware.com/less/news.609.html","http://www.openwall.com/lists/oss-security/2023/02/07/7","https://github.com/gwsw/less/commit/a78e1351113cef564d790a730d657a321624d79c","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LR7AUWB34JD4PCW3HHASBEDGGHFWPAQP/","https://security.gentoo.org/glsa/202310-11","https://www.openwall.com/lists/oss-security/2023/02/07/7"],"published_time":"2023-02-07T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-25193","summary":"hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00107,"ranking_epss":0.28899,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromium.googlesource.com/chromium/src/+/e1f324aa681af54101c1f2d173d92adb80e37088/DEPS#361","https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh","https://github.com/harfbuzz/harfbuzz/commit/85be877925ddbf34f74a1229f3ca1716bb6170dc","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZ5M2GSAIHFPLHYJXUPQ2QDJCLWXUGO3/","https://security.netapp.com/advisory/ntap-20230725-0006/","https://chromium.googlesource.com/chromium/src/+/e1f324aa681af54101c1f2d173d92adb80e37088/DEPS#361","https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh","https://github.com/harfbuzz/harfbuzz/commit/85be877925ddbf34f74a1229f3ca1716bb6170dc","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZ5M2GSAIHFPLHYJXUPQ2QDJCLWXUGO3/","https://security.netapp.com/advisory/ntap-20230725-0006/"],"published_time":"2023-02-04T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-25136","summary":"OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states \"remote code execution is theoretically possible.\"","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.88329,"ranking_epss":0.99499,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/02/13/1","http://www.openwall.com/lists/oss-security/2023/02/22/1","http://www.openwall.com/lists/oss-security/2023/02/22/2","http://www.openwall.com/lists/oss-security/2023/02/23/3","http://www.openwall.com/lists/oss-security/2023/03/06/1","http://www.openwall.com/lists/oss-security/2023/03/09/2","https://bugzilla.mindrot.org/show_bug.cgi?id=3522","https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig","https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946","https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGAUIXJ3TEKCRKVWFQ6GDAGQFTIIGQQP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7LKQDFZWKYHQ65TBSH2X2HJQ4V2THS3/","https://news.ycombinator.com/item?id=34711565","https://security.gentoo.org/glsa/202307-01","https://security.netapp.com/advisory/ntap-20230309-0003/","https://www.openwall.com/lists/oss-security/2023/02/02/2","http://www.openwall.com/lists/oss-security/2023/02/13/1","http://www.openwall.com/lists/oss-security/2023/02/22/1","http://www.openwall.com/lists/oss-security/2023/02/22/2","http://www.openwall.com/lists/oss-security/2023/02/23/3","http://www.openwall.com/lists/oss-security/2023/03/06/1","http://www.openwall.com/lists/oss-security/2023/03/09/2","https://bugzilla.mindrot.org/show_bug.cgi?id=3522","https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig","https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946","https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGAUIXJ3TEKCRKVWFQ6GDAGQFTIIGQQP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7LKQDFZWKYHQ65TBSH2X2HJQ4V2THS3/","https://news.ycombinator.com/item?id=34711565","https://security.gentoo.org/glsa/202307-01","https://security.netapp.com/advisory/ntap-20230309-0003/","https://www.openwall.com/lists/oss-security/2023/02/02/2"],"published_time":"2023-02-03T06:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-3560","summary":"A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12416,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2135420#c0","https://bugzilla.redhat.com/show_bug.cgi?id=2135420#c0"],"published_time":"2023-02-02T21:22:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-48303","summary":"GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14748,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/","https://savannah.gnu.org/bugs/?62387","https://savannah.gnu.org/patch/?10307","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/","https://savannah.gnu.org/bugs/?62387","https://savannah.gnu.org/patch/?10307"],"published_time":"2023-01-30T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4285","summary":"An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00057,"ranking_epss":0.17702,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2150768","https://security.gentoo.org/glsa/202309-15","https://sourceware.org/bugzilla/show_bug.cgi?id=29699","https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70","https://bugzilla.redhat.com/show_bug.cgi?id=2150768","https://security.gentoo.org/glsa/202309-15","https://sourceware.org/bugzilla/show_bug.cgi?id=29699","https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70"],"published_time":"2023-01-27T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-47021","summary":"A null pointer dereference issue was discovered in functions op_get_data and op_open1 in opusfile.c in xiph opusfile 0.9 thru 0.12 allows attackers to cause denial of service or other unspecified impacts.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00094,"ranking_epss":0.26091,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/xiph/opusfile/commit/0a4cd796df5b030cb866f3f4a5e41a4b92caddf5","https://github.com/xiph/opusfile/issues/36","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ODIA6QRIRBNF2HRXOE5VCZ2AFP4ZB4R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LIKBLOE433RA44YTYUZLED4IOWJG5DV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ED4CWLBR2WQ2IXXTHZ24UYZBRNCLMJXH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYPAQANM2ZNPXRBFOS5NFXNJ7O4Q3OBD/","https://github.com/xiph/opusfile/commit/0a4cd796df5b030cb866f3f4a5e41a4b92caddf5","https://github.com/xiph/opusfile/issues/36","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ODIA6QRIRBNF2HRXOE5VCZ2AFP4ZB4R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LIKBLOE433RA44YTYUZLED4IOWJG5DV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ED4CWLBR2WQ2IXXTHZ24UYZBRNCLMJXH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYPAQANM2ZNPXRBFOS5NFXNJ7O4Q3OBD/"],"published_time":"2023-01-20T19:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22809","summary":"In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a \"--\" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.48016,"ranking_epss":0.97731,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html","http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html","http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html","http://seclists.org/fulldisclosure/2023/Aug/21","http://www.openwall.com/lists/oss-security/2023/01/19/1","https://lists.debian.org/debian-lts-announce/2023/01/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4YNBTTKTRT2ME3NTSXAPTOKYUE47XHZ/","https://security.gentoo.org/glsa/202305-12","https://security.netapp.com/advisory/ntap-20230127-0015/","https://support.apple.com/kb/HT213758","https://www.debian.org/security/2023/dsa-5321","https://www.sudo.ws/security/advisories/sudoedit_any/","https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf","http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html","http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html","http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html","http://seclists.org/fulldisclosure/2023/Aug/21","http://www.openwall.com/lists/oss-security/2023/01/19/1","https://lists.debian.org/debian-lts-announce/2023/01/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4YNBTTKTRT2ME3NTSXAPTOKYUE47XHZ/","https://security.gentoo.org/glsa/202305-12","https://security.netapp.com/advisory/ntap-20230127-0015/","https://support.apple.com/kb/HT213758","https://www.debian.org/security/2023/dsa-5321","https://www.sudo.ws/security/advisories/sudoedit_any/","https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf"],"published_time":"2023-01-18T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2018-14628","summary":"An information leak vulnerability was discovered in Samba's LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00502,"ranking_epss":0.66104,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/11/28/4","https://bugzilla.redhat.com/show_bug.cgi?id=1625445","https://bugzilla.samba.org/show_bug.cgi?id=13595","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DK57HQRTCDOZDIIICYWQ4Z5IQXTWVVW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVMYEP5KJRL3FWSCZW2MQZ26IVPXY62/","http://www.openwall.com/lists/oss-security/2023/11/28/4","https://bugzilla.redhat.com/show_bug.cgi?id=1625445","https://bugzilla.samba.org/show_bug.cgi?id=13595","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DK57HQRTCDOZDIIICYWQ4Z5IQXTWVVW/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVMYEP5KJRL3FWSCZW2MQZ26IVPXY62/","https://security.netapp.com/advisory/ntap-20230223-0008/"],"published_time":"2023-01-17T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-47318","summary":"ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00708,"ranking_epss":0.7224,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/ruby-git/ruby-git","https://github.com/ruby-git/ruby-git/pull/602","https://jvn.jp/en/jp/JVN16765254/index.html","https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/","https://github.com/ruby-git/ruby-git","https://github.com/ruby-git/ruby-git/pull/602","https://jvn.jp/en/jp/JVN16765254/index.html","https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/"],"published_time":"2023-01-17T10:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22298","summary":"Open redirect vulnerability in pgAdmin 4 versions prior to v6.14 allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.0148,"ranking_epss":0.81026,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pgadmin-org/pgadmin4","https://github.com/pgadmin-org/pgadmin4/issues/5343","https://jvn.jp/en/jp/JVN03832974/index.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHY2B25YHIIFQ3G44TR7NNEST7FJGJPH/","https://www.pgadmin.org/","https://github.com/pgadmin-org/pgadmin4","https://github.com/pgadmin-org/pgadmin4/issues/5343","https://jvn.jp/en/jp/JVN03832974/index.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHY2B25YHIIFQ3G44TR7NNEST7FJGJPH/","https://www.pgadmin.org/"],"published_time":"2023-01-17T10:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-23589","summary":"The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00396,"ranking_epss":0.60427,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc","https://gitlab.torproject.org/tpo/core/tor/-/issues/40730","https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotes","https://lists.debian.org/debian-lts-announce/2023/01/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/","https://security.gentoo.org/glsa/202305-11","https://www.debian.org/security/2023/dsa-5320","https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc","https://gitlab.torproject.org/tpo/core/tor/-/issues/40730","https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotes","https://lists.debian.org/debian-lts-announce/2023/01/msg00026.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/","https://security.gentoo.org/glsa/202305-11","https://www.debian.org/security/2023/dsa-5320"],"published_time":"2023-01-14T01:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-23456","summary":"A heap-based buffer overflow issue was discovered in UPX in PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to cause a denial of service (abort) via a crafted file.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03793,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2160381","https://github.com/upx/upx/commit/510505a85cbe45e51fbd470f1aa8b02157c429d4","https://github.com/upx/upx/issues/632","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/","https://bugzilla.redhat.com/show_bug.cgi?id=2160381","https://github.com/upx/upx/commit/510505a85cbe45e51fbd470f1aa8b02157c429d4","https://github.com/upx/upx/issues/632","https://lists.debian.org/debian-lts-announce/2024/12/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/"],"published_time":"2023-01-12T19:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-23457","summary":"A Segmentation fault was found in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00175,"ranking_epss":0.39072,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2160382","https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860","https://github.com/upx/upx/issues/631","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/","https://bugzilla.redhat.com/show_bug.cgi?id=2160382","https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860","https://github.com/upx/upx/issues/631","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/"],"published_time":"2023-01-12T19:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-3437","summary":"A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00725,"ranking_epss":0.72621,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/02/08/1","https://access.redhat.com/security/cve/CVE-2022-3437","https://bugzilla.redhat.com/show_bug.cgi?id=2137774","https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html","https://security.gentoo.org/glsa/202309-06","https://security.gentoo.org/glsa/202310-06","https://security.netapp.com/advisory/ntap-20230216-0008/","https://www.samba.org/samba/security/CVE-2022-3437.html","http://www.openwall.com/lists/oss-security/2023/02/08/1","https://access.redhat.com/security/cve/CVE-2022-3437","https://bugzilla.redhat.com/show_bug.cgi?id=2137774","https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html","https://security.gentoo.org/glsa/202309-06","https://security.gentoo.org/glsa/202310-06","https://security.netapp.com/advisory/ntap-20230216-0008/","https://www.samba.org/samba/security/CVE-2022-3437.html"],"published_time":"2023-01-12T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-3592","summary":"A symlink following vulnerability was found in Samba, where a user can create a symbolic link that will make 'smbd' escape the configured share path. This flaw allows a remote user with access to the exported part of the file system under a share via SMB1 unix extensions or NFS to create symlinks to files outside the 'smbd' configured share path and gain access to another restricted server's filesystem.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00635,"ranking_epss":0.70444,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2022-3592","https://bugzilla.redhat.com/show_bug.cgi?id=2137776","https://security.gentoo.org/glsa/202309-06","https://www.samba.org/samba/security/CVE-2022-3592.html","https://access.redhat.com/security/cve/CVE-2022-3592","https://bugzilla.redhat.com/show_bug.cgi?id=2137776","https://security.gentoo.org/glsa/202309-06","https://www.samba.org/samba/security/CVE-2022-3592.html"],"published_time":"2023-01-12T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-47927","summary":"An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. When installing with a pre-existing data directory that has weak permissions, the SQLite files are created with file mode 0644, i.e., world readable to local users. These files include credentials data.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.1621,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2023/07/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/","https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/thread/UEMW64LVEH3BEXCJV43CVS6XPYURKWU3/","https://phabricator.wikimedia.org/T322637","https://security.gentoo.org/glsa/202305-24","https://lists.debian.org/debian-lts-announce/2023/07/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/","https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/thread/UEMW64LVEH3BEXCJV43CVS6XPYURKWU3/","https://phabricator.wikimedia.org/T322637","https://security.gentoo.org/glsa/202305-24"],"published_time":"2023-01-12T06:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22945","summary":"In the GrowthExperiments extension for MediaWiki through 1.39, the growthmanagementorlist API allows blocked users (blocked in ApiManageMentorList) to enroll as mentors or edit any of their mentorship-related properties.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00123,"ranking_epss":0.31429,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gerrit.wikimedia.org/r/q/Id1b83fcd58eccb8b2dfea44a3ab2f72314860d88","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/","https://phabricator.wikimedia.org/T321733","https://gerrit.wikimedia.org/r/q/Id1b83fcd58eccb8b2dfea44a3ab2f72314860d88","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/","https://phabricator.wikimedia.org/T321733"],"published_time":"2023-01-11T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4379","summary":"A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00358,"ranking_epss":0.58076,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da","https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/","https://seclists.org/oss-sec/2022/q4/185","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0","https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da","https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/","https://seclists.org/oss-sec/2022/q4/185","https://security.netapp.com/advisory/ntap-20230223-0004/"],"published_time":"2023-01-10T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21538","summary":".NET Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0085,"ranking_epss":0.74913,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21538","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21538"],"published_time":"2023-01-10T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22909","summary":"An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. SpecialMobileHistory allows remote attackers to cause a denial of service because database queries are slow.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00723,"ranking_epss":0.72584,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/","https://phabricator.wikimedia.org/T320987","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/","https://phabricator.wikimedia.org/T320987"],"published_time":"2023-01-10T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-22911","summary":"An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. E-Widgets does widget replacement in HTML attributes, which can lead to XSS, because widget authors often do not expect that their widget is executed in an HTML attribute context.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00565,"ranking_epss":0.6847,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/","https://phabricator.wikimedia.org/T149488","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/","https://phabricator.wikimedia.org/T149488"],"published_time":"2023-01-10T08:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-0049","summary":"Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.11884,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://seclists.org/fulldisclosure/2023/Mar/17","https://github.com/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c","https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3Y752EAVACVC5XY2TMGGOAIU25VQRPDW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T33LLWHLH63XDCO5OME7NWN63RA4U5HF/","https://security.gentoo.org/glsa/202305-16","https://support.apple.com/kb/HT213670","http://seclists.org/fulldisclosure/2023/Mar/17","https://github.com/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c","https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3Y752EAVACVC5XY2TMGGOAIU25VQRPDW/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T33LLWHLH63XDCO5OME7NWN63RA4U5HF/","https://security.gentoo.org/glsa/202305-16","https://security.netapp.com/advisory/ntap-20250117-0005/","https://support.apple.com/kb/HT213670"],"published_time":"2023-01-04T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46175","summary":"JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 versions 1.0.2, 2.2.2, and later.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.46501,"ranking_epss":0.97666,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/json5/json5/issues/199","https://github.com/json5/json5/issues/295","https://github.com/json5/json5/pull/298","https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h","https://lists.debian.org/debian-lts-announce/2023/11/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3S26TLPLVFAJTUN3VIXFDEBEXDYO22CE/","https://github.com/json5/json5/issues/199","https://github.com/json5/json5/issues/295","https://github.com/json5/json5/pull/298","https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h","https://lists.debian.org/debian-lts-announce/2023/11/msg00021.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3S26TLPLVFAJTUN3VIXFDEBEXDYO22CE/"],"published_time":"2022-12-24T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-43551","summary":"A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12697,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://hackerone.com/reports/1755083","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230427-0007/","https://hackerone.com/reports/1755083","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/","https://security.gentoo.org/glsa/202310-12","https://security.netapp.com/advisory/ntap-20230427-0007/"],"published_time":"2022-12-23T15:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33640","summary":"After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free).","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00281,"ranking_epss":0.51507,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4S4PJRCJLEAWN2EKXGLSOBTL7O57V7NC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WX5YE66CT7Y5C2HTHXSFDKQWYWYWJ2T/","https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2021-33640&packageName=libtar","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4S4PJRCJLEAWN2EKXGLSOBTL7O57V7NC/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WX5YE66CT7Y5C2HTHXSFDKQWYWYWJ2T/","https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2021-33640&packageName=libtar"],"published_time":"2022-12-19T16:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-3109","summary":"An issue was discovered in the FFmpeg package, where vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause a null pointer dereference, impacting availability.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00193,"ranking_epss":0.41205,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2153551","https://github.com/FFmpeg/FFmpeg/commit/656cb0450aeb73b25d7d26980af342b37ac4c568","https://lists.debian.org/debian-lts-announce/2023/06/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KOMB6WRUC55VWV25IKJTV22KARBUGWGQ/","https://www.debian.org/security/2023/dsa-5394","https://bugzilla.redhat.com/show_bug.cgi?id=2153551","https://github.com/FFmpeg/FFmpeg/commit/656cb0450aeb73b25d7d26980af342b37ac4c568","https://lists.debian.org/debian-lts-announce/2023/06/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KOMB6WRUC55VWV25IKJTV22KARBUGWGQ/","https://www.debian.org/security/2023/dsa-5394"],"published_time":"2022-12-16T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46392","summary":"An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00213,"ranking_epss":0.43872,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2","https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/","https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2","https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0","https://lists.debian.org/debian-lts-announce/2025/06/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/"],"published_time":"2022-12-15T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46393","summary":"An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. There is a potential heap-based buffer overflow and heap-based buffer over-read in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00868,"ranking_epss":0.75207,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2","https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/","https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/","https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2","https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/","https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/"],"published_time":"2022-12-15T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4283","summary":"A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00187,"ranking_epss":0.40554,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2022-4283","https://bugzilla.redhat.com/show_bug.cgi?id=2151761","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304","https://access.redhat.com/security/cve/CVE-2022-4283","https://bugzilla.redhat.com/show_bug.cgi?id=2151761","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304"],"published_time":"2022-12-14T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46340","summary":"A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01202,"ranking_epss":0.78952,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2022-46340","https://bugzilla.redhat.com/show_bug.cgi?id=2151755","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWTH3SNJ3GKYDSN7I3QDGWYEPSMWU6EP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304","https://access.redhat.com/security/cve/CVE-2022-46340","https://bugzilla.redhat.com/show_bug.cgi?id=2151755","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWTH3SNJ3GKYDSN7I3QDGWYEPSMWU6EP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304"],"published_time":"2022-12-14T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46341","summary":"A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01181,"ranking_epss":0.78778,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2022-46341","https://bugzilla.redhat.com/show_bug.cgi?id=2151756","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304","https://access.redhat.com/security/cve/CVE-2022-46341","https://bugzilla.redhat.com/show_bug.cgi?id=2151756","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304"],"published_time":"2022-12-14T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46342","summary":"A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00148,"ranking_epss":0.35225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2022-46342","https://bugzilla.redhat.com/show_bug.cgi?id=2151757","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304","https://access.redhat.com/security/cve/CVE-2022-46342","https://bugzilla.redhat.com/show_bug.cgi?id=2151757","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304"],"published_time":"2022-12-14T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46343","summary":"A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01181,"ranking_epss":0.78778,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2022-46343","https://bugzilla.redhat.com/show_bug.cgi?id=2151758","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304","https://access.redhat.com/security/cve/CVE-2022-46343","https://bugzilla.redhat.com/show_bug.cgi?id=2151758","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304"],"published_time":"2022-12-14T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46344","summary":"A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00966,"ranking_epss":0.76622,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/12/13/1","https://access.redhat.com/security/cve/CVE-2022-46344","https://bugzilla.redhat.com/show_bug.cgi?id=2151760","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304","http://www.openwall.com/lists/oss-security/2023/12/13/1","https://access.redhat.com/security/cve/CVE-2022-46344","https://bugzilla.redhat.com/show_bug.cgi?id=2151760","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/","https://security.gentoo.org/glsa/202305-30","https://www.debian.org/security/2022/dsa-5304"],"published_time":"2022-12-14T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-2601","summary":"A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.20648,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2112975#c0","https://security.gentoo.org/glsa/202311-14","https://security.netapp.com/advisory/ntap-20230203-0004/","https://arstechnica.com/security/2024/08/a-patch-microsoft-spent-2-years-preparing-is-making-a-mess-for-some-linux-users/","https://bugzilla.redhat.com/show_bug.cgi?id=2112975#c0","https://security.gentoo.org/glsa/202311-14","https://security.netapp.com/advisory/ntap-20230203-0004/"],"published_time":"2022-12-14T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4223","summary":"The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.87793,"ranking_epss":0.99476,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pgadmin-org/pgadmin4/issues/5593","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5EYTPKHVFSDCETBJI7LBZE4EYHBPN2Q/","https://github.com/pgadmin-org/pgadmin4/issues/5593","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5EYTPKHVFSDCETBJI7LBZE4EYHBPN2Q/"],"published_time":"2022-12-13T16:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4170","summary":"The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.03165,"ranking_epss":0.86948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2151597","https://security.gentoo.org/glsa/202310-20","https://www.openwall.com/lists/oss-security/2022/12/05/1","https://bugzilla.redhat.com/show_bug.cgi?id=2151597","https://security.gentoo.org/glsa/202310-20","https://www.openwall.com/lists/oss-security/2022/12/05/1"],"published_time":"2022-12-09T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41717","summary":"An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00331,"ranking_epss":0.56079,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://go.dev/cl/455635","https://go.dev/cl/455717","https://go.dev/issue/56350","https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56B2FFESRYYP6IY2AZ3UWXLWKZ5IYZN4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANIOPUXWIHVRA6CEWXCGOMX3YYS6KFHG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSVIS6MTMFVBA7JPMRAUNKUOYEVSJYSB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQGNAXK3YBPMUP3J4TECIRDHFGW37522/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUM4DIVOLJCBK5ZDP4LJOL24GXT3YSIR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q52IQI754YAE4XPR4QBRWPIVZWYGZ4FS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QBKBAZBIOXZV5QCFHZNSVXULR32XJCYD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WPEIZ7AMEJCZXU3FEJZMVRNHQZXX5P3I/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/","https://pkg.go.dev/vuln/GO-2022-1144","https://security.gentoo.org/glsa/202311-09","https://go.dev/cl/455635","https://go.dev/cl/455717","https://go.dev/issue/56350","https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56B2FFESRYYP6IY2AZ3UWXLWKZ5IYZN4/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANIOPUXWIHVRA6CEWXCGOMX3YYS6KFHG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSVIS6MTMFVBA7JPMRAUNKUOYEVSJYSB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQGNAXK3YBPMUP3J4TECIRDHFGW37522/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUM4DIVOLJCBK5ZDP4LJOL24GXT3YSIR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q52IQI754YAE4XPR4QBRWPIVZWYGZ4FS/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QBKBAZBIOXZV5QCFHZNSVXULR32XJCYD/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WPEIZ7AMEJCZXU3FEJZMVRNHQZXX5P3I/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/","https://pkg.go.dev/vuln/GO-2022-1144","https://security.gentoo.org/glsa/202311-09","https://security.netapp.com/advisory/ntap-20230120-0008/"],"published_time":"2022-12-08T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4122","summary":"A vulnerability was found in buildah. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00178,"ranking_epss":0.39391,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2144983","https://github.com/containers/podman/pull/16315","https://bugzilla.redhat.com/show_bug.cgi?id=2144983","https://github.com/containers/podman/pull/16315"],"published_time":"2022-12-08T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4123","summary":"A flaw was found in Buildah. The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13267,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2144989","https://bugzilla.redhat.com/show_bug.cgi?id=2144989"],"published_time":"2022-12-08T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24439","summary":"All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.68859,"ranking_epss":0.98634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/gitpython-developers/GitPython/blob/bec61576ae75803bc4e60d8de7a629c194313d1c/git/repo/base.py%23L1249","https://lists.debian.org/debian-lts-announce/2023/07/msg00024.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV5DV7GBLMOZT7U3Q4TDOJO5R6G3V6GH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IKMVYKLWX62UEYKAN64RUZMOIAMZM5JN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF6AXUTC5BO7L2SBJMCVKJSPKWY52I5R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJHN3QUXPJIMM6SULIR3PR34UFWRAE7X/","https://security.gentoo.org/glsa/202311-01","https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858","https://github.com/gitpython-developers/GitPython/blob/bec61576ae75803bc4e60d8de7a629c194313d1c/git/repo/base.py%23L1249","https://lists.debian.org/debian-lts-announce/2023/07/msg00024.html","https://lists.debian.org/debian-lts-announce/2024/10/msg00030.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV5DV7GBLMOZT7U3Q4TDOJO5R6G3V6GH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IKMVYKLWX62UEYKAN64RUZMOIAMZM5JN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF6AXUTC5BO7L2SBJMCVKJSPKWY52I5R/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJHN3QUXPJIMM6SULIR3PR34UFWRAE7X/","https://security.gentoo.org/glsa/202311-01","https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858"],"published_time":"2022-12-06T05:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46391","summary":"AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00952,"ranking_epss":0.7643,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/eldy/AWStats/pull/226","https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/","https://github.com/eldy/AWStats/pull/226","https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/"],"published_time":"2022-12-04T03:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-46149","summary":"Cap'n Proto is a data interchange format and remote procedure call (RPC) system. Cap'n Proro prior to versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3, as well as versions of Cap'n Proto's Rust implementation prior to 0.13.7, 0.14.11, and 0.15.2 are vulnerable to out-of-bounds read due to logic error handling list-of-list. This issue may lead someone to remotely segfault a peer by sending it a malicious message, if the victim performs certain actions on a list-of-pointer type. Exfiltration of memory is possible if the victim performs additional certain actions on a list-of-pointer type. To be vulnerable, an application must perform a specific sequence of actions, described in the GitHub Security Advisory. The bug is present in inlined code, therefore the fix will require rebuilding dependent applications. Cap'n Proto has C++ fixes available in versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3. The `capnp` Rust crate has fixes available in versions 0.13.7, 0.14.11, and 0.15.2.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00183,"ranking_epss":0.40082,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/capnproto/capnproto/commit/25d34c67863fd960af34fc4f82a7ca3362ee74b9","https://github.com/capnproto/capnproto/security/advisories/GHSA-qqff-4vw4-f6hx","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAHKLUMJAXJEV5BPBS5XXWBQ3ZTHGOLY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTS6TWD6K2NKXLEEFBPROQXMOFUTEYWY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WKXM4JAFXLTXU5IQB3OUBQVCIICZWGYX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZOCQQOPMVQOFUWBWAGVGN76OYAV3WXY4/","https://github.com/capnproto/capnproto/commit/25d34c67863fd960af34fc4f82a7ca3362ee74b9","https://github.com/capnproto/capnproto/security/advisories/GHSA-qqff-4vw4-f6hx","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAHKLUMJAXJEV5BPBS5XXWBQ3ZTHGOLY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTS6TWD6K2NKXLEEFBPROQXMOFUTEYWY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WKXM4JAFXLTXU5IQB3OUBQVCIICZWGYX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZOCQQOPMVQOFUWBWAGVGN76OYAV3WXY4/"],"published_time":"2022-11-30T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4144","summary":"An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.05832,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2148506","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTVPHLLXJ65BUMFBUUZ35F3J632SLFRK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7J5IRXJYLELW7D43A75LOWRUE5EU54O/","https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg04143.html","https://security.netapp.com/advisory/ntap-20230127-0012/","https://bugzilla.redhat.com/show_bug.cgi?id=2148506","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTVPHLLXJ65BUMFBUUZ35F3J632SLFRK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7J5IRXJYLELW7D43A75LOWRUE5EU54O/","https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg04143.html","https://security.netapp.com/advisory/ntap-20230127-0012/"],"published_time":"2022-11-29T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4172","summary":"An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.09186,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.com/qemu-project/qemu/-/commit/defb7098","https://gitlab.com/qemu-project/qemu/-/issues/1268","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7J5IRXJYLELW7D43A75LOWRUE5EU54O/","https://lore.kernel.org/qemu-devel/20221024154233.1043347-1-lk%40c--e.de/","https://security.netapp.com/advisory/ntap-20230127-0013/","https://gitlab.com/qemu-project/qemu/-/commit/defb7098","https://gitlab.com/qemu-project/qemu/-/issues/1268","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7J5IRXJYLELW7D43A75LOWRUE5EU54O/","https://lore.kernel.org/qemu-devel/20221024154233.1043347-1-lk%40c--e.de/","https://security.netapp.com/advisory/ntap-20230127-0013/"],"published_time":"2022-11-29T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4129","summary":"A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0002,"ranking_epss":0.05365,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/","https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t","https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t","https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/","https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t","https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t"],"published_time":"2022-11-28T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45939","summary":"GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the \"ctags *\" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13587,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=d48bb4874bc6cd3e69c7a15fc3c91cc141025c51","https://lists.debian.org/debian-lts-announce/2022/12/msg00046.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOSK3J7BBAEI4IITW2DRUKLQYUZYKH6Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GOXIH2FDEQJEAARE52C3GHTLGQFBYPIB/","https://www.debian.org/security/2023/dsa-5314","https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=d48bb4874bc6cd3e69c7a15fc3c91cc141025c51","https://lists.debian.org/debian-lts-announce/2022/12/msg00046.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOSK3J7BBAEI4IITW2DRUKLQYUZYKH6Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GOXIH2FDEQJEAARE52C3GHTLGQFBYPIB/","https://www.debian.org/security/2023/dsa-5314"],"published_time":"2022-11-28T06:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45934","summary":"An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00409,"ranking_epss":0.61282,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d","https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDAKCGDW6CQ6G3RZWYZJO454R3L5CTQB/","https://security.netapp.com/advisory/ntap-20230113-0008/","https://www.debian.org/security/2023/dsa-5324","https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d","https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDAKCGDW6CQ6G3RZWYZJO454R3L5CTQB/","https://security.netapp.com/advisory/ntap-20230113-0008/","https://www.debian.org/security/2023/dsa-5324"],"published_time":"2022-11-27T04:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45152","summary":"A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.","cvss":9.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.1,"cvss_v4":null,"epss":0.00182,"ranking_epss":0.39988,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920","https://bugzilla.redhat.com/show_bug.cgi?id=2142775","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/","https://moodle.org/mod/forum/discuss.php?d=440772","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920","https://bugzilla.redhat.com/show_bug.cgi?id=2142775","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/","https://moodle.org/mod/forum/discuss.php?d=440772"],"published_time":"2022-11-25T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-39346","summary":"Nextcloud server is an open source personal cloud server. Affected versions of nextcloud server did not properly limit user display names which could allow a malicious users to overload the backing database and cause a denial of service. It is recommended that the Nextcloud Server is upgraded to 22.2.10, 23.0.7 or 24.0.3. There are no known workarounds for this issue.","cvss":3.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.5,"cvss_v4":null,"epss":0.016,"ranking_epss":0.81733,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6w9f-jgjx-4vj6","https://github.com/nextcloud/server/pull/33052","https://hackerone.com/reports/1588562","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TARDPRPBTI5TJRBYRVVQGTL6KWRCV5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R32L3P53AQKQQC652LA5U3AWFTZKPDK3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRAER4DCCHHSUDFHQ6LTIH4JEJFF73IU/","https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6w9f-jgjx-4vj6","https://github.com/nextcloud/server/pull/33052","https://hackerone.com/reports/1588562","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TARDPRPBTI5TJRBYRVVQGTL6KWRCV5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R32L3P53AQKQQC652LA5U3AWFTZKPDK3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRAER4DCCHHSUDFHQ6LTIH4JEJFF73IU/"],"published_time":"2022-11-25T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-4141","summary":"Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.11895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/vim/vim/commit/cc762a48d42b579fb7bdec2c614636b830342dd5","https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f","https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AZ3JMSUCR6Y7626RDWQ2HNSUFIQOJ33G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6ZNKVN4GICORTVFKVCM4MSOXCYWNHUC/","https://security.gentoo.org/glsa/202305-16","https://github.com/vim/vim/commit/cc762a48d42b579fb7bdec2c614636b830342dd5","https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f","https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html","https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AZ3JMSUCR6Y7626RDWQ2HNSUFIQOJ33G/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6ZNKVN4GICORTVFKVCM4MSOXCYWNHUC/","https://security.gentoo.org/glsa/202305-16"],"published_time":"2022-11-25T14:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45873","summary":"systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.11015,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437","https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497","https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MS5N5SLYAHKENLAJWYBDKU55ICU3SVZF/","https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437","https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497","https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MS5N5SLYAHKENLAJWYBDKU55ICU3SVZF/"],"published_time":"2022-11-23T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44789","summary":"A logical issue in O_getOwnPropertyDescriptor() in Artifex MuJS 1.0.0 through 1.3.x before 1.3.2 allows an attacker to achieve Remote Code Execution through memory corruption, via the loading of a crafted JavaScript file.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02601,"ranking_epss":0.85642,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/alalng/CVE-2022-44789/blob/main/PublicReferenceURL.txt","https://github.com/ccxvii/mujs/commit/edb50ad66f7601ca9a3544a0e9045e8a8c60561f","https://github.com/ccxvii/mujs/releases/tag/1.3.2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MC6PLHTXHZ7GW7QQGTLBHLXL47UHTHXO/","https://www.debian.org/security/2022/dsa-5291","https://github.com/alalng/CVE-2022-44789/blob/main/PublicReferenceURL.txt","https://github.com/ccxvii/mujs/commit/edb50ad66f7601ca9a3544a0e9045e8a8c60561f","https://github.com/ccxvii/mujs/releases/tag/1.3.2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MC6PLHTXHZ7GW7QQGTLBHLXL47UHTHXO/","https://www.debian.org/security/2022/dsa-5291"],"published_time":"2022-11-23T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45866","summary":"qpress before PierreLvx/qpress 20220819 and before version 11.3, as used in Percona XtraBackup and other products, allows directory traversal via ../ in a .qp file.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0063,"ranking_epss":0.70327,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/EvgeniyPatlan/qpress/commit/ddb312090ebd5794e81bc6fb1dfb4e79eda48761","https://github.com/PierreLvx/qpress/compare/20170415...20220819","https://github.com/PierreLvx/qpress/pull/6","https://github.com/percona/percona-xtrabackup/pull/1366","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQWF7635AJSDKEIGLB73XAH643POGTFY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4RXO3VYIFRTNIFHWIAZWND6ZXQ5OYOB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUZ73XT2FXLHC7I4ODLOVB4O4QN7Q7JB/","https://pkgs.org/download/qpress","https://github.com/EvgeniyPatlan/qpress/commit/ddb312090ebd5794e81bc6fb1dfb4e79eda48761","https://github.com/PierreLvx/qpress/compare/20170415...20220819","https://github.com/PierreLvx/qpress/pull/6","https://github.com/percona/percona-xtrabackup/pull/1366","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQWF7635AJSDKEIGLB73XAH643POGTFY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4RXO3VYIFRTNIFHWIAZWND6ZXQ5OYOB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUZ73XT2FXLHC7I4ODLOVB4O4QN7Q7JB/","https://pkgs.org/download/qpress"],"published_time":"2022-11-23T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45149","summary":"A vulnerability was found in Moodle which exists due to insufficient validation of the HTTP request origin in course redirect URL. A user's CSRF token was unnecessarily included in the URL when being redirected to a course they have just restored. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website. This flaw allows an attacker to perform cross-site request forgery attacks.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00303,"ranking_epss":0.53655,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75862","https://bugzilla.redhat.com/show_bug.cgi?id=2142772","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/","https://moodle.org/mod/forum/discuss.php?d=440769","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75862","https://bugzilla.redhat.com/show_bug.cgi?id=2142772","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/","https://moodle.org/mod/forum/discuss.php?d=440769"],"published_time":"2022-11-23T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45150","summary":"A reflected cross-site scripting vulnerability was discovered in Moodle. This flaw exists due to insufficient sanitization of user-supplied data in policy tool. An attacker can trick the victim to open a specially crafted link that executes an arbitrary HTML and script code in user's browser in context of vulnerable website. This vulnerability may allow an attacker to perform cross-site scripting (XSS) attacks to gain access potentially sensitive information and modification of web pages.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00675,"ranking_epss":0.71493,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76091","https://bugzilla.redhat.com/show_bug.cgi?id=2142773","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/","https://moodle.org/mod/forum/discuss.php?d=440770","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76091","https://bugzilla.redhat.com/show_bug.cgi?id=2142773","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/","https://moodle.org/mod/forum/discuss.php?d=440770"],"published_time":"2022-11-23T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45151","summary":"The stored-XSS vulnerability was discovered in Moodle which exists due to insufficient sanitization of user-supplied data in several \"social\" user profile fields. An attacker could inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00274,"ranking_epss":0.5084,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76131","https://bugzilla.redhat.com/show_bug.cgi?id=2142774","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/","https://moodle.org/mod/forum/discuss.php?d=440771","http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76131","https://bugzilla.redhat.com/show_bug.cgi?id=2142774","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/","https://moodle.org/mod/forum/discuss.php?d=440771"],"published_time":"2022-11-23T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-3500","summary":"A vulnerability was found in keylime. This security issue happens in some circumstances, due to some improperly handled exceptions, there exists the possibility that a rogue agent could create errors on the verifier that stopped attestation attempts for that host leaving it in an attested state but not verifying that anymore.","cvss":5.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.1,"cvss_v4":null,"epss":0.00152,"ranking_epss":0.35936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2022-3500","https://github.com/keylime/keylime/pull/1128","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PUTHMDVFNGGVPCNPOGULMJAAFEP7MEXP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QX4XVCAUFGJ2I2NCTOKONTJGRJB2NBBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQH5CJRX65QYMQN5WGUKKKE3IRJBWG5Z/","https://access.redhat.com/security/cve/CVE-2022-3500","https://github.com/keylime/keylime/pull/1128","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PUTHMDVFNGGVPCNPOGULMJAAFEP7MEXP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QX4XVCAUFGJ2I2NCTOKONTJGRJB2NBBT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQH5CJRX65QYMQN5WGUKKKE3IRJBWG5Z/"],"published_time":"2022-11-22T19:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-36227","summary":"In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: \"In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution.\"","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00425,"ranking_epss":0.62274,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugs.gentoo.org/882521","https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215","https://github.com/libarchive/libarchive/issues/1754","https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/","https://security.gentoo.org/glsa/202309-14","https://bugs.gentoo.org/882521","https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215","https://github.com/libarchive/libarchive/issues/1754","https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html","https://lists.debian.org/debian-lts-announce/2024/11/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/","https://security.gentoo.org/glsa/202309-14"],"published_time":"2022-11-22T02:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33621","summary":"The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01412,"ranking_epss":0.8056,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQR7LWED6VAPD5ATYOBZIGJQPCUBRJBX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THVTYHHEOVLQFCFHWURZYO7PVUPBHRZD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YACE6ORF2QBXXBK2V2CM36D7TZMEJVAS/","https://security.gentoo.org/glsa/202401-27","https://security.netapp.com/advisory/ntap-20221228-0004/","https://www.ruby-lang.org/en/news/2022/11/22/http-response-splitting-in-cgi-cve-2021-33621/","https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQR7LWED6VAPD5ATYOBZIGJQPCUBRJBX/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THVTYHHEOVLQFCFHWURZYO7PVUPBHRZD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YACE6ORF2QBXXBK2V2CM36D7TZMEJVAS/","https://security.gentoo.org/glsa/202401-27","https://security.netapp.com/advisory/ntap-20221228-0004/","https://www.ruby-lang.org/en/news/2022/11/22/http-response-splitting-in-cgi-cve-2021-33621/"],"published_time":"2022-11-18T23:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-39317","summary":"FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing a range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it. This issue has been addressed in version 2.9.0. There are no known workarounds for this issue.","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.2209,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-99cm-4gw7-c8jh","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-99cm-4gw7-c8jh","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2022-11-16T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-39318","summary":"FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.","cvss":4.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00166,"ranking_epss":0.37791,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/80adde17ddc4b596ed1dae0922a0c54ab3d4b8ea","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-387j-8j96-7q35","https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/commit/80adde17ddc4b596ed1dae0922a0c54ab3d4b8ea","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-387j-8j96-7q35","https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2022-11-16T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-39319","summary":"FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00156,"ranking_epss":0.36377,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/11555828d2cf289b350baba5ad1f462f10b80b76","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mvxm-wfj2-5fvh","https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/commit/11555828d2cf289b350baba5ad1f462f10b80b76","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mvxm-wfj2-5fvh","https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2022-11-16T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-39316","summary":"FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade.","cvss":4.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00166,"ranking_epss":0.37791,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/e865c24efc40ebc52e75979c94cdd4ee2c1495b0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5w4j-mrrh-jjrm","https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/commit/e865c24efc40ebc52e75979c94cdd4ee2c1495b0","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5w4j-mrrh-jjrm","https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2022-11-16T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-39320","summary":"FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00109,"ranking_epss":0.29114,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qfq2-82qr-7f4j","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qfq2-82qr-7f4j","https://lists.debian.org/debian-lts-announce/2025/02/msg00034.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2022-11-16T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-39347","summary":"FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch.","cvss":2.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.6,"cvss_v4":null,"epss":0.00188,"ranking_epss":0.40645,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/027424c2c6c0991cb9c22f9511478229c9b17e5d","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c5xq-8v35-pffg","https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/commit/027424c2c6c0991cb9c22f9511478229c9b17e5d","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c5xq-8v35-pffg","https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2022-11-16T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41877","summary":"FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`.","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00156,"ranking_epss":0.36377,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/FreeRDP/FreeRDP/commit/6655841cf2a00b764f855040aecb8803cfc5eaba","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pmv3-wpw4-pw5h","https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16","https://github.com/FreeRDP/FreeRDP/commit/6655841cf2a00b764f855040aecb8803cfc5eaba","https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pmv3-wpw4-pw5h","https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html","https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/","https://security.gentoo.org/glsa/202401-16"],"published_time":"2022-11-16T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37290","summary":"GNOME Nautilus 42.2 allows a NULL pointer dereference and get_basename application crash via a pasted ZIP archive.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10072,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.gnome.org/GNOME/nautilus/-/issues/2376","https://gitlab.gnome.org/GNOME/nautilus/-/merge_requests/1001","https://gitlab.gnome.org/GNOME/nautilus/-/tree/master","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PX5CVF4FAHFA6UNKHFBBLOP2NUMIQJAY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYPDZ7LBBUVU3WFK7DCGDFGK2GXTKGT5/","https://gitlab.gnome.org/GNOME/nautilus/-/issues/2376","https://gitlab.gnome.org/GNOME/nautilus/-/merge_requests/1001","https://gitlab.gnome.org/GNOME/nautilus/-/tree/master","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PX5CVF4FAHFA6UNKHFBBLOP2NUMIQJAY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYPDZ7LBBUVU3WFK7DCGDFGK2GXTKGT5/"],"published_time":"2022-11-14T08:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45188","summary":"Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting in code execution via a crafted .appl file. This provides remote root access on some platforms such as FreeBSD (used for TrueNAS).","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18329,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZYWSGVA6WXREMB6PV56HAHKU7R6KPOP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GEAFLA5L2SHOUFBAGUXIF2TZLGBXGJKT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SG6WZW5LXFVH3P7ZVZRGHUVJEMEFKQLI/","https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html","https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.14.html","https://rushbnt.github.io/bug%20analysis/netatalk-0day/","https://security.gentoo.org/glsa/202311-02","https://sourceforge.net/projects/netatalk/files/netatalk/","https://www.debian.org/security/2023/dsa-5503","https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZYWSGVA6WXREMB6PV56HAHKU7R6KPOP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GEAFLA5L2SHOUFBAGUXIF2TZLGBXGJKT/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SG6WZW5LXFVH3P7ZVZRGHUVJEMEFKQLI/","https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html","https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.14.html","https://rushbnt.github.io/bug%20analysis/netatalk-0day/","https://security.gentoo.org/glsa/202311-02","https://sourceforge.net/projects/netatalk/files/netatalk/","https://www.debian.org/security/2023/dsa-5503"],"published_time":"2022-11-12T05:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41854","summary":"Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.","cvss":5.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.8,"cvss_v4":null,"epss":0.00103,"ranking_epss":0.28162,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3DDXEXXWAZGF5AVHIPGFPXIWL6TSMKJE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MKE4XWRXTH32757H7QJU4ACS67DYDCR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSPAJ5Y45A4ZDION2KN5RDWLHK4XKY2J/","https://security.netapp.com/advisory/ntap-20240315-0009/","https://security.netapp.com/advisory/ntap-20240621-0006/","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3DDXEXXWAZGF5AVHIPGFPXIWL6TSMKJE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MKE4XWRXTH32757H7QJU4ACS67DYDCR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSPAJ5Y45A4ZDION2KN5RDWLHK4XKY2J/","https://security.netapp.com/advisory/ntap-20240315-0009/","https://security.netapp.com/advisory/ntap-20240621-0006/"],"published_time":"2022-11-11T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45063","summary":"xterm before 375 allows code execution via font ops, e.g., because an OSC 50 response may have Ctrl-g and therefore lead to command execution within the vi line-editing mode of Zsh. NOTE: font ops are not allowed in the xterm default configurations of some Linux distributions.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.17938,"ranking_epss":0.95162,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/10/1","http://www.openwall.com/lists/oss-security/2022/11/10/5","http://www.openwall.com/lists/oss-security/2024/06/15/1","http://www.openwall.com/lists/oss-security/2024/06/17/1","https://invisible-island.net/xterm/xterm.log.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TPVNTYFFWNTGZJJQAA4MGGFSTXA4XEA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5T2JI5JCHPTXX2KJU45H2XAHQSFVEJ2Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IVD3I2ZFXGOY6BA2FNS7WPFMPFBDHFWC/","https://news.ycombinator.com/item?id=33546415","https://security.gentoo.org/glsa/202211-09","https://www.openwall.com/lists/oss-security/2022/11/10/1","http://www.openwall.com/lists/oss-security/2022/11/10/1","http://www.openwall.com/lists/oss-security/2022/11/10/5","http://www.openwall.com/lists/oss-security/2024/06/15/1","http://www.openwall.com/lists/oss-security/2024/06/17/1","http://www.openwall.com/lists/oss-security/2026/04/08/1","http://www.openwall.com/lists/oss-security/2026/04/08/10","https://invisible-island.net/xterm/xterm.log.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TPVNTYFFWNTGZJJQAA4MGGFSTXA4XEA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5T2JI5JCHPTXX2KJU45H2XAHQSFVEJ2Y/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IVD3I2ZFXGOY6BA2FNS7WPFMPFBDHFWC/","https://news.ycombinator.com/item?id=33546415","https://security.gentoo.org/glsa/202211-09","https://www.openwall.com/lists/oss-security/2022/11/10/1"],"published_time":"2022-11-10T16:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38023","summary":"Netlogon RPC Elevation of Privilege Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00481,"ranking_epss":0.6515,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023","https://security.gentoo.org/glsa/202309-06"],"published_time":"2022-11-09T22:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37967","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.02981,"ranking_epss":0.86547,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967","https://security.gentoo.org/glsa/202309-06"],"published_time":"2022-11-09T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37966","summary":"Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01378,"ranking_epss":0.80291,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966","https://security.gentoo.org/glsa/202309-06"],"published_time":"2022-11-09T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23824","summary":"IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12507,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/10/2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://security.gentoo.org/glsa/202402-07","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040","https://www.debian.org/security/2023/dsa-5378","http://www.openwall.com/lists/oss-security/2022/11/10/2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://security.gentoo.org/glsa/202402-07","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040","https://www.debian.org/security/2023/dsa-5378"],"published_time":"2022-11-09T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45062","summary":"In Xfce xfce4-settings before 4.16.4 and 4.17.x before 4.17.1, there is an argument injection vulnerability in xfce4-mime-helper.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.03547,"ranking_epss":0.87702,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gitlab.xfce.org/xfce/xfce4-settings/-/commit/55e3c5fb667e96ad1412cf249879262b369d28d7","https://gitlab.xfce.org/xfce/xfce4-settings/-/commit/f34a92a84f96268ad24a7a13fd5edc9f1d526110","https://gitlab.xfce.org/xfce/xfce4-settings/-/issues/390","https://gitlab.xfce.org/xfce/xfce4-settings/-/tags","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGTGTTPFHDUB3EZHVKDK4H32QUUYPPFF/","https://security.gentoo.org/glsa/202305-05","https://www.debian.org/security/2022/dsa-5296","https://gitlab.xfce.org/xfce/xfce4-settings/-/commit/55e3c5fb667e96ad1412cf249879262b369d28d7","https://gitlab.xfce.org/xfce/xfce4-settings/-/commit/f34a92a84f96268ad24a7a13fd5edc9f1d526110","https://gitlab.xfce.org/xfce/xfce4-settings/-/issues/390","https://gitlab.xfce.org/xfce/xfce4-settings/-/tags","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGTGTTPFHDUB3EZHVKDK4H32QUUYPPFF/","https://security.gentoo.org/glsa/202305-05","https://www.debian.org/security/2022/dsa-5296","https://gitlab.xfce.org/xfce/xfce4-settings/-/issues/390"],"published_time":"2022-11-09T07:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45061","summary":"An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00124,"ranking_epss":0.31557,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/python/cpython/issues/98433","https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html","https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/","https://security.gentoo.org/glsa/202305-02","https://security.netapp.com/advisory/ntap-20221209-0007/","https://github.com/python/cpython/issues/98433","https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html","https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html","https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html","https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/","https://security.gentoo.org/glsa/202305-02","https://security.netapp.com/advisory/ntap-20221209-0007/"],"published_time":"2022-11-09T07:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45059","summary":"An issue was discovered in Varnish Cache 7.x before 7.1.2 and 7.2.x before 7.2.1. A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the backend.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01524,"ranking_epss":0.8131,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/","https://varnish-cache.org/security/VSV00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/","https://varnish-cache.org/security/VSV00010.html"],"published_time":"2022-11-09T06:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-45060","summary":"An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00952,"ranking_epss":0.76439,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.varnish-software.com/security/VSV00011","https://lists.debian.org/debian-lts-announce/2022/11/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/","https://varnish-cache.org/security/VSV00011.html","https://www.debian.org/security/2023/dsa-5334","https://docs.varnish-software.com/security/VSV00011","https://lists.debian.org/debian-lts-announce/2022/11/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/","https://varnish-cache.org/security/VSV00011.html","https://www.debian.org/security/2023/dsa-5334"],"published_time":"2022-11-09T06:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-3821","summary":"An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10203,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2139327","https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e","https://github.com/systemd/systemd/issues/23928","https://github.com/systemd/systemd/pull/23933","https://lists.debian.org/debian-lts-announce/2023/06/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/","https://security.gentoo.org/glsa/202305-15","https://bugzilla.redhat.com/show_bug.cgi?id=2139327","https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e","https://github.com/systemd/systemd/issues/23928","https://github.com/systemd/systemd/pull/23933","https://lists.debian.org/debian-lts-announce/2023/06/msg00036.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/","https://security.gentoo.org/glsa/202305-15"],"published_time":"2022-11-08T22:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-39377","summary":"sysstat is a set of system performance tools for the Linux operating system. On 32 bit systems, in versions 9.1.16 and newer but prior to 12.7.1, allocate_structures contains a size_t overflow in sa_common.c. The allocate_structures function insufficiently checks bounds before arithmetic multiplication, allowing for an overflow in the size allocated for the buffer representing system activities. This issue may lead to Remote Code Execution (RCE). This issue has been patched in version 12.7.1.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.01192,"ranking_epss":0.78873,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/sysstat/sysstat/security/advisories/GHSA-q8r6-g56f-9w7x","https://lists.debian.org/debian-lts-announce/2022/11/msg00014.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6F26ALXWYHT4LN2AHPZM34OQEXTJE3JZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X6WKTODOUDV6M3HZMASYNZP6EM4N7W4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHUVUDIVDJZ7AVXD3XX3NBXXXKPOKN3N/","https://security.gentoo.org/glsa/202211-07","https://github.com/sysstat/sysstat/security/advisories/GHSA-q8r6-g56f-9w7x","https://lists.debian.org/debian-lts-announce/2022/11/msg00014.html","https://lists.debian.org/debian-lts-announce/2025/10/msg00017.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6F26ALXWYHT4LN2AHPZM34OQEXTJE3JZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X6WKTODOUDV6M3HZMASYNZP6EM4N7W4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHUVUDIVDJZ7AVXD3XX3NBXXXKPOKN3N/","https://security.gentoo.org/glsa/202211-07"],"published_time":"2022-11-08T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42920","summary":"Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.03797,"ranking_epss":0.88093,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/07/2","https://lists.apache.org/thread/lfxk7q8qmnh5bt9jm6nmjlv5hsxjhrz4","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LX3HEB4TV2BVCGDTK5BCLSYOZNQTOBN4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QAMRHAKGIKZNHRBB4VLYTOIOIMMXCUCD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMVX6COVXZVS5GPWDODIRW6Z2GE7RPAQ/","https://security.gentoo.org/glsa/202401-25","http://www.openwall.com/lists/oss-security/2022/11/07/2","https://lists.apache.org/thread/lfxk7q8qmnh5bt9jm6nmjlv5hsxjhrz4","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LX3HEB4TV2BVCGDTK5BCLSYOZNQTOBN4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QAMRHAKGIKZNHRBB4VLYTOIOIMMXCUCD/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMVX6COVXZVS5GPWDODIRW6Z2GE7RPAQ/","https://security.gentoo.org/glsa/202401-25"],"published_time":"2022-11-07T13:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42919","summary":"Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11444,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/python/cpython/compare/v3.10.8...v3.10.9","https://github.com/python/cpython/compare/v3.9.15...v3.9.16","https://github.com/python/cpython/issues/97514","https://github.com/python/cpython/issues/97514#issuecomment-1310277840","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKGCQPIVHEAIJ77R3RSNSQWYBUDVWDKU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2LHWWEI5OBQ6RELULMVU6KMDYG4WZXH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PI5DYIED6U26BGX5IRZWNCP6TY4M2ZGZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6KGIRHSENZ4QAB234Z36HVIDTRJ3MFI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCRKBB5Y5EWTJUNC7LK665WO64DDXSTN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XX6LLAXGZVZ327REY6MDZRMMP47LJ53P/","https://security.gentoo.org/glsa/202305-02","https://security.netapp.com/advisory/ntap-20221209-0006/","https://github.com/python/cpython/compare/v3.10.8...v3.10.9","https://github.com/python/cpython/compare/v3.9.15...v3.9.16","https://github.com/python/cpython/issues/97514","https://github.com/python/cpython/issues/97514#issuecomment-1310277840","https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKGCQPIVHEAIJ77R3RSNSQWYBUDVWDKU/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2LHWWEI5OBQ6RELULMVU6KMDYG4WZXH/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PI5DYIED6U26BGX5IRZWNCP6TY4M2ZGZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6KGIRHSENZ4QAB234Z36HVIDTRJ3MFI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCRKBB5Y5EWTJUNC7LK665WO64DDXSTN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XX6LLAXGZVZ327REY6MDZRMMP47LJ53P/","https://security.gentoo.org/glsa/202305-02","https://security.netapp.com/advisory/ntap-20221209-0006/"],"published_time":"2022-11-07T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-40284","summary":"A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00049,"ranking_epss":0.1508,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/10/31/2","https://github.com/tuxera/ntfs-3g/releases","https://lists.debian.org/debian-lts-announce/2022/11/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2BOQ7YLFT43KLXEN3EB6CS4DP635RJWP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IA2D4PYOR7ABI7BWBMMMYKY2OPHTV2NI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGDKGXA4R2ZVUQ3CT4D4YGTFMNZQA7HW/","https://security.gentoo.org/glsa/202301-01","http://www.openwall.com/lists/oss-security/2022/10/31/2","https://github.com/tuxera/ntfs-3g/releases","https://lists.debian.org/debian-lts-announce/2022/11/msg00029.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2BOQ7YLFT43KLXEN3EB6CS4DP635RJWP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IA2D4PYOR7ABI7BWBMMMYKY2OPHTV2NI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGDKGXA4R2ZVUQ3CT4D4YGTFMNZQA7HW/","https://security.gentoo.org/glsa/202301-01"],"published_time":"2022-11-06T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44638","summary":"In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00416,"ranking_epss":0.61743,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/170121/pixman-pixman_sample_floor_y-Integer-Overflow.html","http://www.openwall.com/lists/oss-security/2022/11/05/1","https://gitlab.freedesktop.org/pixman/pixman/-/issues/63","https://lists.debian.org/debian-lts-announce/2022/11/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/","https://www.debian.org/security/2022/dsa-5276","http://packetstormsecurity.com/files/170121/pixman-pixman_sample_floor_y-Integer-Overflow.html","http://www.openwall.com/lists/oss-security/2022/11/05/1","https://gitlab.freedesktop.org/pixman/pixman/-/issues/63","https://lists.debian.org/debian-lts-announce/2022/11/msg00008.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/","https://www.debian.org/security/2022/dsa-5276"],"published_time":"2022-11-03T06:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-39379","summary":"Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`.","cvss":3.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.1,"cvss_v4":null,"epss":0.07736,"ranking_epss":0.91953,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135","https://github.com/fluent/fluentd/security/advisories/GHSA-fppq-mj76-fpj2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYD5QV66OLDHES6IKVYYM3Y3YID3VVCO/","https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135","https://github.com/fluent/fluentd/security/advisories/GHSA-fppq-mj76-fpj2","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYD5QV66OLDHES6IKVYYM3Y3YID3VVCO/"],"published_time":"2022-11-02T13:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42823","summary":"A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may lead to arbitrary code execution.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00714,"ranking_epss":0.72373,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/04/4","https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/","https://security.gentoo.org/glsa/202305-32","https://support.apple.com/en-us/HT213488","https://support.apple.com/en-us/HT213489","https://support.apple.com/en-us/HT213491","https://support.apple.com/en-us/HT213492","https://support.apple.com/en-us/HT213495","https://www.debian.org/security/2022/dsa-5273","https://www.debian.org/security/2022/dsa-5274","http://www.openwall.com/lists/oss-security/2022/11/04/4","https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/","https://security.gentoo.org/glsa/202305-32","https://support.apple.com/en-us/HT213488","https://support.apple.com/en-us/HT213489","https://support.apple.com/en-us/HT213491","https://support.apple.com/en-us/HT213492","https://support.apple.com/en-us/HT213495","https://www.debian.org/security/2022/dsa-5273","https://www.debian.org/security/2022/dsa-5274"],"published_time":"2022-11-01T20:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42824","summary":"A logic issue was addressed with improved state management. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may disclose sensitive user information.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00033,"ranking_epss":0.09495,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/04/4","https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/","https://security.gentoo.org/glsa/202305-32","https://support.apple.com/en-us/HT213488","https://support.apple.com/en-us/HT213489","https://support.apple.com/en-us/HT213491","https://support.apple.com/en-us/HT213492","https://support.apple.com/en-us/HT213495","https://www.debian.org/security/2022/dsa-5273","https://www.debian.org/security/2022/dsa-5274","http://www.openwall.com/lists/oss-security/2022/11/04/4","https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/","https://security.gentoo.org/glsa/202305-32","https://support.apple.com/en-us/HT213488","https://support.apple.com/en-us/HT213489","https://support.apple.com/en-us/HT213491","https://support.apple.com/en-us/HT213492","https://support.apple.com/en-us/HT213495","https://www.debian.org/security/2022/dsa-5273","https://www.debian.org/security/2022/dsa-5274"],"published_time":"2022-11-01T20:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42799","summary":"The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00523,"ranking_epss":0.66967,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/04/4","https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/","https://security.gentoo.org/glsa/202305-32","https://support.apple.com/en-us/HT213488","https://support.apple.com/en-us/HT213489","https://support.apple.com/en-us/HT213491","https://support.apple.com/en-us/HT213492","https://support.apple.com/en-us/HT213495","https://www.debian.org/security/2022/dsa-5273","https://www.debian.org/security/2022/dsa-5274","http://www.openwall.com/lists/oss-security/2022/11/04/4","https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/","https://security.gentoo.org/glsa/202305-32","https://support.apple.com/en-us/HT213488","https://support.apple.com/en-us/HT213489","https://support.apple.com/en-us/HT213491","https://support.apple.com/en-us/HT213492","https://support.apple.com/en-us/HT213495","https://www.debian.org/security/2022/dsa-5273","https://www.debian.org/security/2022/dsa-5274"],"published_time":"2022-11-01T20:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-3786","summary":"A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.\n\n","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.21428,"ranking_epss":0.95718,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a","https://www.openssl.org/news/secadv/20221101.txt","https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00789.html","https://www.kb.cert.org/vuls/id/794340","https://www.openssl.org/news/secadv/20221101.txt","https://cert-portal.siemens.com/productcert/html/ssa-408105.html"],"published_time":"2022-11-01T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-3602","summary":"A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.83219,"ranking_epss":0.99269,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html","http://www.openwall.com/lists/oss-security/2022/11/01/15","http://www.openwall.com/lists/oss-security/2022/11/01/16","http://www.openwall.com/lists/oss-security/2022/11/01/17","http://www.openwall.com/lists/oss-security/2022/11/01/18","http://www.openwall.com/lists/oss-security/2022/11/01/19","http://www.openwall.com/lists/oss-security/2022/11/01/20","http://www.openwall.com/lists/oss-security/2022/11/01/21","http://www.openwall.com/lists/oss-security/2022/11/01/24","http://www.openwall.com/lists/oss-security/2022/11/02/1","http://www.openwall.com/lists/oss-security/2022/11/02/10","http://www.openwall.com/lists/oss-security/2022/11/02/11","http://www.openwall.com/lists/oss-security/2022/11/02/12","http://www.openwall.com/lists/oss-security/2022/11/02/13","http://www.openwall.com/lists/oss-security/2022/11/02/14","http://www.openwall.com/lists/oss-security/2022/11/02/15","http://www.openwall.com/lists/oss-security/2022/11/02/2","http://www.openwall.com/lists/oss-security/2022/11/02/3","http://www.openwall.com/lists/oss-security/2022/11/02/5","http://www.openwall.com/lists/oss-security/2022/11/02/6","http://www.openwall.com/lists/oss-security/2022/11/02/7","http://www.openwall.com/lists/oss-security/2022/11/02/9","http://www.openwall.com/lists/oss-security/2022/11/03/1","http://www.openwall.com/lists/oss-security/2022/11/03/10","http://www.openwall.com/lists/oss-security/2022/11/03/11","http://www.openwall.com/lists/oss-security/2022/11/03/2","http://www.openwall.com/lists/oss-security/2022/11/03/3","http://www.openwall.com/lists/oss-security/2022/11/03/5","http://www.openwall.com/lists/oss-security/2022/11/03/6","http://www.openwall.com/lists/oss-security/2022/11/03/7","http://www.openwall.com/lists/oss-security/2022/11/03/9","https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fe3b639dc19b325846f4f6801f2f4604f56e3de3","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/","https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023","https://security.gentoo.org/glsa/202211-01","https://security.netapp.com/advisory/ntap-20221102-0001/","https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a","https://www.kb.cert.org/vuls/id/794340","https://www.openssl.org/news/secadv/20221101.txt","http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html","http://www.openwall.com/lists/oss-security/2022/11/01/15","http://www.openwall.com/lists/oss-security/2022/11/01/16","http://www.openwall.com/lists/oss-security/2022/11/01/17","http://www.openwall.com/lists/oss-security/2022/11/01/18","http://www.openwall.com/lists/oss-security/2022/11/01/19","http://www.openwall.com/lists/oss-security/2022/11/01/20","http://www.openwall.com/lists/oss-security/2022/11/01/21","http://www.openwall.com/lists/oss-security/2022/11/01/24","http://www.openwall.com/lists/oss-security/2022/11/02/1","http://www.openwall.com/lists/oss-security/2022/11/02/10","http://www.openwall.com/lists/oss-security/2022/11/02/11","http://www.openwall.com/lists/oss-security/2022/11/02/12","http://www.openwall.com/lists/oss-security/2022/11/02/13","http://www.openwall.com/lists/oss-security/2022/11/02/14","http://www.openwall.com/lists/oss-security/2022/11/02/15","http://www.openwall.com/lists/oss-security/2022/11/02/2","http://www.openwall.com/lists/oss-security/2022/11/02/3","http://www.openwall.com/lists/oss-security/2022/11/02/5","http://www.openwall.com/lists/oss-security/2022/11/02/6","http://www.openwall.com/lists/oss-security/2022/11/02/7","http://www.openwall.com/lists/oss-security/2022/11/02/9","http://www.openwall.com/lists/oss-security/2022/11/03/1","http://www.openwall.com/lists/oss-security/2022/11/03/10","http://www.openwall.com/lists/oss-security/2022/11/03/11","http://www.openwall.com/lists/oss-security/2022/11/03/2","http://www.openwall.com/lists/oss-security/2022/11/03/3","http://www.openwall.com/lists/oss-security/2022/11/03/5","http://www.openwall.com/lists/oss-security/2022/11/03/6","http://www.openwall.com/lists/oss-security/2022/11/03/7","http://www.openwall.com/lists/oss-security/2022/11/03/9","https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fe3b639dc19b325846f4f6801f2f4604f56e3de3","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/","https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023","https://security.gentoo.org/glsa/202211-01","https://security.netapp.com/advisory/ntap-20221102-0001/","https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00789.html","https://www.kb.cert.org/vuls/id/794340","https://www.openssl.org/news/secadv/20221101.txt","https://cert-portal.siemens.com/productcert/html/ssa-408105.html"],"published_time":"2022-11-01T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-39369","summary":"phpCAS is an authentication library that allows PHP applications to easily authenticate users via a Central Authentication Service (CAS) server. The phpCAS library uses HTTP headers to determine the service URL used to validate tickets. This allows an attacker to control the host header and use a valid ticket granted for any authorized service in the same SSO realm (CAS server) to authenticate to the service protected by phpCAS. Depending on the settings of the CAS server service registry in worst case this may be any other service URL (if the allowed URLs are configured to \"^(https)://.*\") or may be strictly limited to known and authorized services in the same SSO federation if proper URL service validation is applied. This vulnerability may allow an attacker to gain access to a victim's account on a vulnerable CASified service without victim's knowledge, when the victim visits attacker's website while being logged in to the same CAS server. phpCAS 1.6.0 is a major version upgrade that starts enforcing service URL discovery validation, because there is unfortunately no 100% safe default config to use in PHP. Starting this version, it is required to pass in an additional service base URL argument when constructing the client class. For more information, please refer to the upgrading doc. This vulnerability only impacts the CAS client that the phpCAS library protects against. The problematic service URL discovery behavior in phpCAS < 1.6.0 will only be disabled, and thus you are not impacted from it, if the phpCAS configuration has the following setup: 1. `phpCAS::setUrl()` is called (a reminder that you have to pass in the full URL of the current page, rather than your service base URL), and 2. `phpCAS::setCallbackURL()` is called, only when the proxy mode is enabled. 3. If your PHP's HTTP header input `X-Forwarded-Host`, `X-Forwarded-Server`, `Host`, `X-Forwarded-Proto`, `X-Forwarded-Protocol` is sanitized before reaching PHP (by a reverse proxy, for example), you will not be impacted by this vulnerability either. If your CAS server service registry is configured to only allow known and trusted service URLs the severity of the vulnerability is reduced substantially in its severity since an attacker must be in control of another authorized service. Otherwise, you should upgrade the library to get the safe service discovery behavior.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00939,"ranking_epss":0.76258,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/apereo/phpCAS/security/advisories/GHSA-8q72-6qq8-xv64","https://lists.debian.org/debian-lts-announce/2023/07/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XL7SMW6ESSP2Y6HHRYWW2MMCZSI4LBZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RUA2JM6YT3ZXSZLBJVRA32AXYM3GJMO3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VJZGTWJ5ZXUUT47EHARNOUUNTH6SYDSE/","https://github.com/apereo/phpCAS/security/advisories/GHSA-8q72-6qq8-xv64","https://lists.debian.org/debian-lts-announce/2023/07/msg00007.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XL7SMW6ESSP2Y6HHRYWW2MMCZSI4LBZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RUA2JM6YT3ZXSZLBJVRA32AXYM3GJMO3/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VJZGTWJ5ZXUUT47EHARNOUUNTH6SYDSE/"],"published_time":"2022-11-01T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42324","summary":"Oxenstored 32->31 bit integer truncation issues Integers in Ocaml are 63 or 31 bits of signed precision. The Ocaml Xenbus library takes a C uint32_t out of the ring and casts it directly to an Ocaml integer. In 64-bit Ocaml builds this is fine, but in 32-bit builds, it truncates off the most significant bit, and then creates unsigned/signed confusion in the remainder. This in turn can feed a negative value into logic not expecting a negative value, resulting in unexpected exceptions being thrown. The unexpected exception is not handled suitably, creating a busy-loop trying (and failing) to take the bad packet out of the xenstore ring.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/01/10","http://xenbits.xen.org/xsa/advisory-420.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-420.txt","http://www.openwall.com/lists/oss-security/2022/11/01/10","http://xenbits.xen.org/xsa/advisory-420.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-420.txt"],"published_time":"2022-11-01T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42325","summary":"Xenstore: Guests can create arbitrary number of nodes via transactions T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] In case a node has been created in a transaction and it is later deleted in the same transaction, the transaction will be terminated with an error. As this error is encountered only when handling the deleted node at transaction finalization, the transaction will have been performed partially and without updating the accounting information. This will enable a malicious guest to create arbitrary number of nodes.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11255,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/01/11","http://xenbits.xen.org/xsa/advisory-421.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-421.txt","http://www.openwall.com/lists/oss-security/2022/11/01/11","http://xenbits.xen.org/xsa/advisory-421.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-421.txt"],"published_time":"2022-11-01T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42326","summary":"Xenstore: Guests can create arbitrary number of nodes via transactions T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] In case a node has been created in a transaction and it is later deleted in the same transaction, the transaction will be terminated with an error. As this error is encountered only when handling the deleted node at transaction finalization, the transaction will have been performed partially and without updating the accounting information. This will enable a malicious guest to create arbitrary number of nodes.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.11071,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/01/11","http://xenbits.xen.org/xsa/advisory-421.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-421.txt","http://www.openwall.com/lists/oss-security/2022/11/01/11","http://xenbits.xen.org/xsa/advisory-421.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-421.txt"],"published_time":"2022-11-01T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42327","summary":"x86: unintended memory sharing between guests On Intel systems that support the \"virtualize APIC accesses\" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02638,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/01/3","http://xenbits.xen.org/xsa/advisory-412.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://xenbits.xenproject.org/xsa/advisory-412.txt","http://www.openwall.com/lists/oss-security/2022/11/01/3","http://xenbits.xen.org/xsa/advisory-412.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://xenbits.xenproject.org/xsa/advisory-412.txt"],"published_time":"2022-11-01T13:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42309","summary":"Xenstore: Guests can crash xenstored Due to a bug in the fix of XSA-115 a malicious guest can cause xenstored to use a wrong pointer during node creation in an error path, resulting in a crash of xenstored or a memory corruption in xenstored causing further damage. Entering the error path can be controlled by the guest e.g. by exceeding the quota value of maximum nodes per domain.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0006,"ranking_epss":0.18831,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/01/4","http://xenbits.xen.org/xsa/advisory-414.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-414.txt","http://www.openwall.com/lists/oss-security/2022/11/01/4","http://xenbits.xen.org/xsa/advisory-414.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-414.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42310","summary":"Xenstore: Guests can create orphaned Xenstore nodes By creating multiple nodes inside a transaction resulting in an error, a malicious guest can create orphaned nodes in the Xenstore data base, as the cleanup after the error will not remove all nodes already created. When the transaction is committed after this situation, nodes without a valid parent can be made permanent in the data base.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07023,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/01/5","http://xenbits.xen.org/xsa/advisory-415.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-415.txt","http://www.openwall.com/lists/oss-security/2022/11/01/5","http://xenbits.xen.org/xsa/advisory-415.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-415.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42311","summary":"Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00155,"ranking_epss":0.36281,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt","http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42312","summary":"Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00157,"ranking_epss":0.36572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt","http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42313","summary":"Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00157,"ranking_epss":0.36572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt","http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42314","summary":"Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00157,"ranking_epss":0.36572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt","http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42315","summary":"Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00157,"ranking_epss":0.36572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt","http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42316","summary":"Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00157,"ranking_epss":0.36572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt","http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42317","summary":"Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00155,"ranking_epss":0.36281,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt","http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42318","summary":"Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00155,"ranking_epss":0.36281,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt","http://xenbits.xen.org/xsa/advisory-326.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-326.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42319","summary":"Xenstore: Guests can cause Xenstore to not free temporary memory When working on a request of a guest, xenstored might need to allocate quite large amounts of memory temporarily. This memory is freed only after the request has been finished completely. A request is regarded to be finished only after the guest has read the response message of the request from the ring page. Thus a guest not reading the response can cause xenstored to not free the temporary memory. This can result in memory shortages causing Denial of Service (DoS) of xenstored.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07818,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/01/6","http://xenbits.xen.org/xsa/advisory-416.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-416.txt","http://www.openwall.com/lists/oss-security/2022/11/01/6","http://xenbits.xen.org/xsa/advisory-416.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-416.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42320","summary":"Xenstore: Guests can get access to Xenstore nodes of deleted domains Access rights of Xenstore nodes are per domid. When a domain is gone, there might be Xenstore nodes left with access rights containing the domid of the removed domain. This is normally no problem, as those access right entries will be corrected when such a node is written later. There is a small time window when a new domain is created, where the access rights of a past domain with the same domid as the new one will be regarded to be still valid, leading to the new domain being able to get access to a node which was meant to be accessible by the removed domain. For this to happen another domain needs to write the node before the newly created domain is being introduced to Xenstore by dom0.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00046,"ranking_epss":0.13898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/01/7","http://xenbits.xen.org/xsa/advisory-417.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-417.txt","http://www.openwall.com/lists/oss-security/2022/11/01/7","http://xenbits.xen.org/xsa/advisory-417.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-417.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42321","summary":"Xenstore: Guests can crash xenstored via exhausting the stack Xenstored is using recursion for some Xenstore operations (e.g. for deleting a sub-tree of Xenstore nodes). With sufficiently deep nesting levels this can result in stack exhaustion on xenstored, leading to a crash of xenstored.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00033,"ranking_epss":0.09509,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/01/8","http://xenbits.xen.org/xsa/advisory-418.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-418.txt","http://www.openwall.com/lists/oss-security/2022/11/01/8","http://xenbits.xen.org/xsa/advisory-418.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-418.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42322","summary":"Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Since the fix of XSA-322 any Xenstore node owned by a removed domain will be modified to be owned by Dom0. This will allow two malicious guests working together to create an arbitrary number of Xenstore nodes. This is possible by domain A letting domain B write into domain A's local Xenstore tree. Domain B can then create many nodes and reboot. The nodes created by domain B will now be owned by Dom0. By repeating this process over and over again an arbitrary number of nodes can be created, as Dom0's number of nodes isn't limited by Xenstore quota.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11255,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2022/11/01/9","http://xenbits.xen.org/xsa/advisory-419.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-419.txt","http://www.openwall.com/lists/oss-security/2022/11/01/9","http://xenbits.xen.org/xsa/advisory-419.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","https://security.gentoo.org/glsa/202402-07","https://www.debian.org/security/2022/dsa-5272","https://xenbits.xenproject.org/xsa/advisory-419.txt"],"published_time":"2022-11-01T13:15:11","vendor":null,"product":null,"version":null}]}