CVE-2024-1947 – Improper Handling of Highly Compressed Data (Data Amplification) in GitLab
https://notcve.org/view.php?id=CVE-2024-1947
A denial of service (DoS) condition was discovered in GitLab CE/EE affecting all versions from 13.2.4 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1. By leveraging this vulnerability an attacker could create a DoS condition by sending crafted API calls. Se descubrió una condición de denegación de servicio (DoS) en GitLab CE/EE que afecta a todas las versiones desde 13.2.4 anterior a 16.10.6, 16.11 anterior a 16.11.3 y 17.0 anterior a 17.0.1. Al aprovechar esta vulnerabilidad, un atacante podría crear una condición DoS enviando llamadas API manipuladas. • https://gitlab.com/gitlab-org/gitlab/-/issues/443559 https://hackerone.com/reports/2380264 • CWE-400: Uncontrolled Resource Consumption CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) •
CVE-2024-31904 – IBM App Connect Enterprise denial of service
https://notcve.org/view.php?id=CVE-2024-31904
IBM App Connect Enterprise 11.0.0.1 through 11.0.0.25 and 12.0.1.0 through 12.0.12.0 integration nodes could allow an authenticated user to cause a denial of service due to an uncaught exception. • https://exchange.xforce.ibmcloud.com/vulnerabilities/289647 https://www.ibm.com/support/pages/node/7154607 • CWE-248: Uncaught Exception •
CVE-2021-47437 – iio: adis16475: fix deadlock on frequency set
https://notcve.org/view.php?id=CVE-2021-47437
En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adis16475: corrige el punto muerto en el conjunto de frecuencias Con el commit 39c024b51b560 ("iio: adis16475: mejora el manejo del modo de escala de sincronización"), se introdujeron dos puntos muertos: 1) La llamada a 'adis_write_reg_16 ()' no se cambió a su versión desbloqueada. 2) El bloqueo no se estaba liberando en la ruta exitosa de la función. • https://git.kernel.org/stable/c/39c024b51b5607e9d2fc6c04c2573e4a778c728d https://git.kernel.org/stable/c/04e03b907022ebd876f422f17efcc2c6cc934dc6 https://git.kernel.org/stable/c/9da1b86865ab4376408c58cd9fec332c8bdb5c73 •
CVE-2021-47434 – xhci: Fix command ring pointer corruption while aborting a command
https://notcve.org/view.php?id=CVE-2021-47434
Dado que dividimos la escritura de 64 bits en dos escrituras de 32 bits, existe la posibilidad de que el anillo de comando xHC se detenga antes de que se escriba la palabra d superior (todo ceros). • https://git.kernel.org/stable/c/22bcb65ea41072ab5d03c0c6290e04e0df6d09a0 https://git.kernel.org/stable/c/62c182b5e763e5f4062e72678e72ce3e02dd4d1b https://git.kernel.org/stable/c/01c2dcb67e71c351006dd17cbba86c26b7f61eaf https://git.kernel.org/stable/c/dec944bb7079b37968cf69c8a438f91f15c4cc61 https://git.kernel.org/stable/c/e54abefe703ab7c4e5983e889babd1447738ca42 https://git.kernel.org/stable/c/ff0e50d3564f33b7f4b35cadeabd951d66cfc570 •
CVE-2024-22273
https://notcve.org/view.php?id=CVE-2024-22273
A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues. • https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308 •