Lucene search

K

Scalance Xr328-4c Wg (24xfe, 4xge,dc24v) Security Vulnerabilities

nvd
nvd

CVE-2024-26614

In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once When I run syz's reproduction C program locally, it causes the following issue: pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0! WARNING: CPU: 19 PID: 21160 at...

5.7AI Score

0.0004EPSS

2024-03-11 06:15 PM
debiancve
debiancve

CVE-2024-26611

In the Linux kernel, the following vulnerability has been resolved: xsk: fix usage of multi-buffer BPF helpers for ZC XDP Currently when packet is shrunk via bpf_xdp_adjust_tail() and memory type is set to MEM_TYPE_XSK_BUFF_POOL, null ptr dereference happens: [1136314.192256] BUG: kernel NULL...

6.5AI Score

0.0004EPSS

2024-03-11 06:15 PM
2
nvd
nvd

CVE-2024-26611

In the Linux kernel, the following vulnerability has been resolved: xsk: fix usage of multi-buffer BPF helpers for ZC XDP Currently when packet is shrunk via bpf_xdp_adjust_tail() and memory type is set to MEM_TYPE_XSK_BUFF_POOL, null ptr dereference happens: [1136314.192256] BUG: kernel NULL...

6.2AI Score

0.0004EPSS

2024-03-11 06:15 PM
cve
cve

CVE-2024-26611

In the Linux kernel, the following vulnerability has been resolved: xsk: fix usage of multi-buffer BPF helpers for ZC XDP Currently when packet is shrunk via bpf_xdp_adjust_tail() and memory type is set to MEM_TYPE_XSK_BUFF_POOL, null ptr dereference happens: [1136314.192256] BUG: kernel NULL...

6.3AI Score

0.0004EPSS

2024-03-11 06:15 PM
2677
cve
cve

CVE-2024-26614

In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once When I run syz's reproduction C program locally, it causes the following issue: pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0! WARNING: CPU: 19 PID: 21160 at...

6.2AI Score

0.0004EPSS

2024-03-11 06:15 PM
2736
debiancve
debiancve

CVE-2024-26614

In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once When I run syz's reproduction C program locally, it causes the following issue: pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0! WARNING: CPU: 19 PID: 21160 at...

6.9AI Score

0.0004EPSS

2024-03-11 06:15 PM
9
nvd
nvd

CVE-2024-26608

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix global oob in ksmbd_nl_policy Similar to a reported issue (check the commit b33fb5b801c6 ("net: qualcomm: rmnet: fix global oob in rmnet_policy"), my local fuzzer finds another global out-of-bounds read for policy...

7AI Score

0.0004EPSS

2024-03-11 06:15 PM
debiancve
debiancve

CVE-2024-26608

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix global oob in ksmbd_nl_policy Similar to a reported issue (check the commit b33fb5b801c6 ("net: qualcomm: rmnet: fix global oob in rmnet_policy"), my local fuzzer finds another global out-of-bounds read for policy...

6.3AI Score

0.0004EPSS

2024-03-11 06:15 PM
8
cve
cve

CVE-2024-26608

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix global oob in ksmbd_nl_policy Similar to a reported issue (check the commit b33fb5b801c6 ("net: qualcomm: rmnet: fix global oob in rmnet_policy"), my local fuzzer finds another global out-of-bounds read for policy...

5.6AI Score

0.0004EPSS

2024-03-11 06:15 PM
2687
prion
prion

Spoofing

In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once When I run syz's reproduction C program locally, it causes the following issue: pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0! WARNING: CPU: 19 PID: 21160 at...

7.2AI Score

0.0004EPSS

2024-03-11 06:15 PM
18
prion
prion

Design/Logic Flaw

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix global oob in ksmbd_nl_policy Similar to a reported issue (check the commit b33fb5b801c6 ("net: qualcomm: rmnet: fix global oob in rmnet_policy"), my local fuzzer finds another global out-of-bounds read for policy...

6.5AI Score

0.0004EPSS

2024-03-11 06:15 PM
7
prion
prion

Null pointer dereference

In the Linux kernel, the following vulnerability has been resolved: xsk: fix usage of multi-buffer BPF helpers for ZC XDP Currently when packet is shrunk via bpf_xdp_adjust_tail() and memory type is set to MEM_TYPE_XSK_BUFF_POOL, null ptr dereference happens: [1136314.192256] BUG: kernel NULL...

6.9AI Score

0.0004EPSS

2024-03-11 06:15 PM
26
nessus
nessus

Ubuntu 22.04 LTS : Linux kernel (OEM) vulnerabilities (USN-6688-1)

The remote Ubuntu 22.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-6688-1 advisory. Transmit requests in Xen's virtual network protocol can consist of multiple parts. While not really useful, except for the initial part any of them...

7.8CVSS

7.7AI Score

0.002EPSS

2024-03-11 12:00 AM
17
ubuntucve
ubuntucve

CVE-2024-26614

In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once When I run syz's reproduction C program locally, it causes the following issue: pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0! WARNING: CPU: 19 PID: 21160 at...

7.6AI Score

0.0004EPSS

2024-03-11 12:00 AM
10
ubuntucve
ubuntucve

CVE-2024-26611

In the Linux kernel, the following vulnerability has been resolved: xsk: fix usage of multi-buffer BPF helpers for ZC XDP Currently when packet is shrunk via bpf_xdp_adjust_tail() and memory type is set to MEM_TYPE_XSK_BUFF_POOL, null ptr dereference happens: [1136314.192256] BUG: kernel NULL...

6.7AI Score

0.0004EPSS

2024-03-11 12:00 AM
8
ubuntucve
ubuntucve

CVE-2024-26608

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix global oob in ksmbd_nl_policy Similar to a reported issue (check the commit b33fb5b801c6 ("net: qualcomm: rmnet: fix global oob in rmnet_policy"), my local fuzzer finds another global out-of-bounds read for policy...

5.7AI Score

0.0004EPSS

2024-03-11 12:00 AM
4
redhatcve
redhatcve

CVE-2023-52603

In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for type....

7.3AI Score

0.0004EPSS

2024-03-06 10:41 PM
11
osv
osv

BIT-tomcat-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.7AI Score

0.732EPSS

2024-03-06 11:07 AM
17
osv
osv

BIT-varnish-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.7AI Score

0.732EPSS

2024-03-06 11:07 AM
13
osv
osv

BIT-solr-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.7AI Score

0.732EPSS

2024-03-06 11:05 AM
9
osv
osv

BIT-node-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.7AI Score

0.732EPSS

2024-03-06 10:58 AM
11
osv
osv

BIT-nginx-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.7AI Score

0.732EPSS

2024-03-06 10:58 AM
61
osv
osv

BIT-jenkins-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.1AI Score

0.732EPSS

2024-03-06 10:54 AM
8
osv
osv

BIT-golang-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.1AI Score

0.732EPSS

2024-03-06 10:53 AM
20
osv
osv

BIT-haproxy-2023-45539

HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static...

8.2CVSS

7.2AI Score

0.001EPSS

2024-03-06 10:52 AM
4
osv
osv

BIT-envoy-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.1AI Score

0.732EPSS

2024-03-06 10:52 AM
16
osv
osv

BIT-dotnet-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.1AI Score

0.732EPSS

2024-03-06 10:52 AM
8
osv
osv

BIT-dotnet-sdk-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.1AI Score

0.732EPSS

2024-03-06 10:51 AM
15
osv
osv

BIT-aspnet-core-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.1AI Score

0.732EPSS

2024-03-06 10:50 AM
8
osv
osv

BIT-contour-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.1AI Score

0.732EPSS

2024-03-06 10:50 AM
13
osv
osv

BIT-apisix-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October...

7.5CVSS

7.1AI Score

0.732EPSS

2024-03-06 10:50 AM
14
nvd
nvd

CVE-2023-52603

In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for type....

7.3AI Score

0.0004EPSS

2024-03-06 07:15 AM
2
debiancve
debiancve

CVE-2023-52603

In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for...

6.6AI Score

0.0004EPSS

2024-03-06 07:15 AM
7
cve
cve

CVE-2023-52603

In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for type....

6.1AI Score

0.0004EPSS

2024-03-06 07:15 AM
812
prion
prion

Design/Logic Flaw

In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for type....

7AI Score

0.0004EPSS

2024-03-06 07:15 AM
6
vulnrichment
vulnrichment

CVE-2023-52603 UBSAN: array-index-out-of-bounds in dtSplitRoot

In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for type....

6.7AI Score

0.0004EPSS

2024-03-06 06:45 AM
cvelist
cvelist

CVE-2023-52603 UBSAN: array-index-out-of-bounds in dtSplitRoot

In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for type....

7.6AI Score

0.0004EPSS

2024-03-06 06:45 AM
nessus
nessus

Amazon Linux 2023 : bpftool, kernel, kernel-devel (ALAS2023-2024-549)

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2024-549 advisory. 2024-05-23: CVE-2024-26665 was added to this advisory. 2024-04-25: CVE-2024-26601 was added to this advisory. 2024-04-25: CVE-2024-26602 was added to this advisory. 2024-04-10: CVE-2024-26603...

8CVSS

6.6AI Score

0.0004EPSS

2024-03-06 12:00 AM
13
nessus
nessus

Amazon Linux 2 : kernel (ALASKERNEL-5.4-2024-061)

The version of kernel installed on the remote host is prior to 5.4.269-183.369. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.4-2024-061 advisory. dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in ...

7.8CVSS

7AI Score

0.0004EPSS

2024-03-06 12:00 AM
14
nessus
nessus

Amazon Linux 2 : kernel (ALASKERNEL-5.15-2024-039)

The version of kernel installed on the remote host is prior to 5.15.149-99.161. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.15-2024-039 advisory. 2024-06-06: CVE-2023-52489 was added to this advisory. 2024-06-06: CVE-2023-52498 was added to this...

7.8CVSS

7.8AI Score

0.0004EPSS

2024-03-06 12:00 AM
19
ubuntucve
ubuntucve

CVE-2023-52603

In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for type....

7.5AI Score

0.0004EPSS

2024-03-06 12:00 AM
13
nessus
nessus

Cisco NX-OS Software Link Layer Discovery Protocol DoS (cisco-sa-nxos-lldp-dos-z7PncTgt)

According to its self-reported version, Cisco NX-OS System Software is affected by a denial of service (DoS) vulnerability. The vulnerability lies in the Link Layer Discovery Protocol (LLDP) feature of Cisco NX-OS Software and could allow an unauthenticated, adjacent attacker to cause a denial of.....

6.6CVSS

6.6AI Score

0.0004EPSS

2024-03-06 12:00 AM
7
nessus
nessus

Amazon Linux 2 : kernel (ALASKERNEL-5.10-2024-051)

The version of kernel installed on the remote host is prior to 5.10.210-201.852. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.10-2024-051 advisory. dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in ...

5.5CVSS

6.8AI Score

0.0004EPSS

2024-03-06 12:00 AM
11
redhatcve
redhatcve

CVE-2021-47099

In the Linux kernel, the following vulnerability has been resolved: veth: ensure skb entering GRO are not cloned. After commit d3256efd8e8b ("veth: allow enabling NAPI even without XDP"), if GRO is enabled on a veth device and TSO is disabled on the peer device, TCP skbs will go through the NAPI...

6.5AI Score

0.0004EPSS

2024-03-05 04:07 PM
7
redhatcve
redhatcve

CVE-2023-52580

In the Linux kernel, the following vulnerability has been resolved: net/core: Fix ETH_P_1588 flow dissector When a PTP ethernet raw frame with a size of more than 256 bytes followed by a 0xff pattern is sent to __skb_flow_dissect, nhoff value calculation is wrong. For example: hdr->message_lengt...

6AI Score

0.0004EPSS

2024-03-04 06:21 PM
5
cve
cve

CVE-2021-47099

In the Linux kernel, the following vulnerability has been resolved: veth: ensure skb entering GRO are not cloned. After commit d3256efd8e8b ("veth: allow enabling NAPI even without XDP"), if GRO is enabled on a veth device and TSO is disabled on the peer device, TCP skbs will go through the NAPI...

6.2AI Score

0.0004EPSS

2024-03-04 06:15 PM
45
debiancve
debiancve

CVE-2021-47099

In the Linux kernel, the following vulnerability has been resolved: veth: ensure skb entering GRO are not cloned. After commit d3256efd8e8b ("veth: allow enabling NAPI even without XDP"), if GRO is enabled on a veth device and TSO is disabled on the peer device, TCP skbs will go through the NAPI...

7.1AI Score

0.0004EPSS

2024-03-04 06:15 PM
4
nvd
nvd

CVE-2021-47099

In the Linux kernel, the following vulnerability has been resolved: veth: ensure skb entering GRO are not cloned. After commit d3256efd8e8b ("veth: allow enabling NAPI even without XDP"), if GRO is enabled on a veth device and TSO is disabled on the peer device, TCP skbs will go through the NAPI...

7.4AI Score

0.0004EPSS

2024-03-04 06:15 PM
1
prion
prion

Spoofing

In the Linux kernel, the following vulnerability has been resolved: veth: ensure skb entering GRO are not cloned. After commit d3256efd8e8b ("veth: allow enabling NAPI even without XDP"), if GRO is enabled on a veth device and TSO is disabled on the peer device, TCP skbs will go through the NAPI...

7.4AI Score

0.0004EPSS

2024-03-04 06:15 PM
4
vulnrichment
vulnrichment

CVE-2021-47099 veth: ensure skb entering GRO are not cloned.

In the Linux kernel, the following vulnerability has been resolved: veth: ensure skb entering GRO are not cloned. After commit d3256efd8e8b ("veth: allow enabling NAPI even without XDP"), if GRO is enabled on a veth device and TSO is disabled on the peer device, TCP skbs will go through the NAPI...

6.7AI Score

0.0004EPSS

2024-03-04 06:10 PM
1
Total number of security vulnerabilities5197