[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-5658-1 linux -- linux

ID: oval:org.secpod.oval:def:99481Date: (C)2024-04-25   (M)2024-04-29
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2023-2124 Kyle Zeng, Akshay Ajayan and Fish Wang discovered that missing metadata validation may result in denial of service or potential privilege escalation if a corrupted XFS disk image is mounted. CVE-2023-2156 It was discovered that the IPv6 RPL protocol implementation in the Linux kernel did not properly handled user-supplied data, resulting in a triggerable assertion. An unauthenticated remote attacker can take advantage of this flaw for denial of service. CVE-2023-2269 Zheng Zhang reported that improper handling of locking in the device mapper implementation may result in denial of service. CVE-2023-3090 It was discovered that missing initialization in ipvlan networking may lead to an out-of-bounds write vulnerability, resulting in denial of service or potentially the execution of arbitrary code. CVE-2023-3212 Yang Lan that missing validation in the GFS2 filesystem could result in denial of service via a NULL pointer dereference when mounting a malformed GFS2 filesystem. CVE-2023-3268 It was discovered that an out-of-bounds memory access in relayfs could result in denial of service or an information leak. CVE-2023-3269 Ruihan Li discovered that incorrect lock handling for accessing and updating virtual memory areas may result in privilege escalation. CVE-2023-3390 A use-after-free flaw in the netfilter subsystem caused by incorrect error path handling may result in denial of service or privilege escalation. CVE-2023-31084 It was discovered that the DVB Core driver does not properly handle locking of certain events, allowing a local user to cause a denial of service. CVE-2023-32250 / CVE-2023-32254 Quentin Minster discovered two race conditions in KSMBD, a kernel server which implements the SMB3 protocol, which could result in denial of service or potentially the execution of arbitrary code. CVE-2023-35788 Hangyu Hua discovered an out-of-bounds write vulnerability in the Flower classifier which may result in denial of service or the execution of arbitrary code.

Platform:
Debian 12.x
Product:
linux-support-6.1
linux-image-6.1
linux-headers-6.1
bpftool
hyperv-daemons
libcpupower-dev
libcpupower1
usbip
Reference:
DSA-5658-1
CVE-2023-2176
CVE-2023-6270
CVE-2023-7042
CVE-2023-28746
CVE-2023-47233
CVE-2023-52429
CVE-2023-52434
CVE-2023-52435
CVE-2023-52583
CVE-2023-52584
CVE-2023-52587
CVE-2023-52588
CVE-2023-52589
CVE-2023-52593
CVE-2023-52594
CVE-2023-52595
CVE-2023-52597
CVE-2023-52598
CVE-2023-52599
CVE-2023-52600
CVE-2023-52601
CVE-2023-52602
CVE-2023-52603
CVE-2023-52604
CVE-2023-52606
CVE-2023-52607
CVE-2023-52616
CVE-2023-52617
CVE-2023-52618
CVE-2023-52619
CVE-2023-52620
CVE-2023-52621
CVE-2023-52622
CVE-2023-52623
CVE-2023-52630
CVE-2023-52631
CVE-2023-52632
CVE-2023-52633
CVE-2023-52635
CVE-2023-52637
CVE-2023-52638
CVE-2023-52639
CVE-2023-52640
CVE-2023-52641
CVE-2024-0340
CVE-2024-0841
CVE-2024-1151
CVE-2024-2201
CVE-2024-22099
CVE-2024-23850
CVE-2024-23851
CVE-2024-24857
CVE-2024-24858
CVE-2024-26581
CVE-2024-26582
CVE-2024-26583
CVE-2024-26584
CVE-2024-26585
CVE-2024-26586
CVE-2024-26590
CVE-2024-26593
CVE-2024-26600
CVE-2024-26601
CVE-2024-26602
CVE-2024-26603
CVE-2024-26606
CVE-2024-26621
CVE-2024-26622
CVE-2024-26625
CVE-2024-26626
CVE-2024-26627
CVE-2024-26629
CVE-2024-26639
CVE-2024-26640
CVE-2024-26641
CVE-2024-26642
CVE-2024-26643
CVE-2024-26651
CVE-2024-26654
CVE-2024-26659
CVE-2024-26660
CVE-2024-26663
CVE-2024-26664
CVE-2024-26665
CVE-2024-26667
CVE-2024-26671
CVE-2024-26673
CVE-2024-26675
CVE-2024-26676
CVE-2024-26679
CVE-2024-26680
CVE-2024-26681
CVE-2024-26684
CVE-2024-26685
CVE-2024-26686
CVE-2024-26687
CVE-2024-26688
CVE-2024-26689
CVE-2024-26695
CVE-2024-26696
CVE-2024-26697
CVE-2024-26698
CVE-2024-26700
CVE-2024-26702
CVE-2024-26704
CVE-2024-26706
CVE-2024-26707
CVE-2024-26710
CVE-2024-26712
CVE-2024-26714
CVE-2024-26715
CVE-2024-26717
CVE-2024-26718
CVE-2024-26720
CVE-2024-26722
CVE-2024-26723
CVE-2024-26726
CVE-2024-26727
CVE-2024-26731
CVE-2024-26733
CVE-2024-26735
CVE-2024-26736
CVE-2024-26737
CVE-2024-26741
CVE-2024-26742
CVE-2024-26743
CVE-2024-26744
CVE-2024-26745
CVE-2024-26747
CVE-2024-26748
CVE-2024-26749
CVE-2024-26750
CVE-2024-26751
CVE-2024-26752
CVE-2024-26753
CVE-2024-26754
CVE-2024-26759
CVE-2024-26760
CVE-2024-26761
CVE-2024-26763
CVE-2024-26764
CVE-2024-26765
CVE-2024-26766
CVE-2024-26769
CVE-2024-26771
CVE-2024-26772
CVE-2024-26773
CVE-2024-26774
CVE-2024-26775
CVE-2024-26776
CVE-2024-26777
CVE-2024-26778
CVE-2024-26779
CVE-2024-26780
CVE-2024-26781
CVE-2024-26782
CVE-2024-26787
CVE-2024-26788
CVE-2024-26789
CVE-2024-26790
CVE-2024-26791
CVE-2024-26792
CVE-2024-26793
CVE-2024-26795
CVE-2024-26798
CVE-2024-26800
CVE-2024-26801
CVE-2024-26802
CVE-2024-26803
CVE-2024-26804
CVE-2024-26805
CVE-2024-26809
CVE-2024-26810
CVE-2024-26811
CVE-2024-26812
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-27437
CVE    179
CVE-2024-27437
CVE-2024-26813
CVE-2024-26814
CVE-2024-26810
...

© SecPod Technologies