Page 24 of 729 results (0.034 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

10 Apr 2020 — An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd. Se detectó un problema en el kernel de Linux versiones anteriores a 5.2, en la plataforma powerpc. El archivo arch/powerpc/kernel/idle_book3s.S no posee la funcionalidad de guardar y restaurar para PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR y PNV_POWERSAVE_AMOR, también ... • http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html • CWE-393: Return of Wrong Status Code •

CVSS: 9.3EPSS: 4%CPEs: 17EXPL: 0

13 Feb 2020 — Adobe Flash Player versions 32.0.0.321 and earlier, 32.0.0.314 and earlier, 32.0.0.321 and earlier, and 32.0.0.255 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution. Adobe Flash Player versiones 32.0.0.321 y anteriores, 32.0.0.314 y anteriores, 32.0.0.321 y anteriores, y 32.0.0.255 y anteriores, presenta una vulnerabilidad de confusión de tipos. Una explotación con éxito podría conllevar a una ejecución de código arbitrario. The flash-plugin pack... • https://access.redhat.com/errata/RHSA-2020:0513 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 2

11 Feb 2020 — Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system. Un desbordamiento del búfer en la función auerswald_probe en el controlador USB Auerswald Linux para el kernel de Linux versiones anteriores a 2.6.27, permite a atacantes físicamente próximos ejecutar código arbitrario, causar una denegación ... • https://www.exploit-db.com/exploits/35957 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 1

04 Feb 2020 — The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls. La corrección para el CVE-2019-11599, que afectaba al kernel de Linux versiones anteriores a 5.0.10, no estaba completa. Un usuario local podría usar este fallo para conseguir infomación confidencial, causar una dene... • https://bugs.chromium.org/p/project-zero/issues/detail?id=1790 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-667: Improper Locking •

CVSS: 6.1EPSS: 0%CPEs: 3EXPL: 2

09 Jan 2020 — An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service. Se encontró un problema de escritura de memoria fuera de límites en el kernel de Linux, versiones 3.13 hasta 5.4, en la manera en que el... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

09 Jan 2020 — A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW m... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19338 • CWE-203: Observable Discrepancy CWE-385: Covert Timing Channel •

CVSS: 3.3EPSS: 0%CPEs: 4EXPL: 0

06 Dec 2019 — An issue exists in the property replacements feature in any descriptor in JBoxx AS 7.1.1 ignores java security policies Se presenta un problema en la funcionalidad property replacements en cualquier descriptor en JBoxx AS versión 7.1.1 ignora las políticas de seguridad de Java. • https://access.redhat.com/security/cve/cve-2012-2148 • CWE-269: Improper Privilege Management •

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 2

03 Dec 2019 — In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494. En FreeRADIUS versiones 3.0 hasta 3.0.19, en promedio 1 de cada 2048 protocolos de enlace EAP-pwd presenta un fallo porque el elemento de contraseña no puede s... • http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-203: Observable Discrepancy •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

03 Dec 2019 — Zanata 3.0.0 through 3.1.2 has RCE due to EL interpolation in logging Zanata versiones 3.0.0 hasta 3.1.2, presenta una RCE debido a una interpolación EL en el inicio de sesión. • https://access.redhat.com/security/cve/cve-2013-4486 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 1

27 Nov 2019 — In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30. En el kernel de Linux anterior a la versión 5.2, una operación setxattr, posterior al montaje de una imagen ext4 especialmente diseñada, puede causar un acceso de escritura fuera de límites debido a un uso de la memoria previament... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html • CWE-416: Use After Free CWE-787: Out-of-bounds Write •