CVE-2023-41744
https://notcve.org/view.php?id=CVE-2023-41744
Local privilege escalation due to unrestricted loading of unsigned libraries. • https://security-advisory.acronis.com/advisories/SEC-4728 • CWE-347: Improper Verification of Cryptographic Signature •
CVE-2023-41743
https://notcve.org/view.php?id=CVE-2023-41743
Local privilege escalation due to insecure driver communication port permissions. • https://security-advisory.acronis.com/SEC-4858 https://security-advisory.acronis.com/advisories/SEC-5487 • CWE-269: Improper Privilege Management •
CVE-2022-46868
https://notcve.org/view.php?id=CVE-2022-46868
Local privilege escalation during recovery due to improper soft link handling. • https://security-advisory.acronis.com/advisories/SEC-2499 • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •
CVE-2022-45451
https://notcve.org/view.php?id=CVE-2022-45451
Local privilege escalation due to insecure driver communication port permissions. • https://github.com/alfarom256/CVE-2022-45451 https://security-advisory.acronis.com/SEC-5487 https://security-advisory.acronis.com/advisories/SEC-4858 • CWE-269: Improper Privilege Management •
CVE-2023-3777 – Use-after-free in Linux kernel's netfilter: nf_tables component
https://notcve.org/view.php?id=CVE-2023-3777
A use-after-free flaw was found in the Linux kernel's netfilter: nf_tables component, which can be exploited to achieve local privilege escalation. • http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8 https://kernel.dance/6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8 https://www.debian.org/security/2023/dsa-5492 https://access.redhat.com/security/cve/CVE-2023-3777 https://bugzilla.redhat.com/show_bug.cgi?id=223 • CWE-416: Use After Free •