The NETSCOUT DDoS Threat Intelligence Report presents a succinct and research-driven analysis of the dynamic distributed denial-of-service (DDoS) attack and defense landscape. Intended to swiftly provide readers with actionable intelligence, the report offers critical insights essential for ongoing network management...
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.52/6.4.15/6.5.2. Affected by this issue is the function d_leaf. Such manipulation leads to privilege escalation.
This vulnerability is referenced as CVE-2023-53361. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 4.19.263/5.4.222/5.10.152/5.15.76/6.0.6. It has been rated as critical. Affected by this vulnerability is an unknown functionality. This manipulation causes memory corruption.
The identification of this vulnerability is CVE-2022-50368. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 5.15.144/6.1.27/6.2.14/6.3.1. It has been declared as critical. Affected is an unknown function of the component ksmbd. The manipulation results in use after free.
This vulnerability was named CVE-2023-53358. The attack needs to be approached within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.4.11. It has been classified as critical. This impacts the function user_mappings. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2023-53367. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.1.38/6.4.3 and classified as critical. This affects the function mc_send_command of the component bus. Executing manipulation can lead to information disclosure.
This vulnerability is handled as CVE-2023-53362. The attack can only be done within the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.10.187/5.15.120/6.1.38/6.4.3 and classified as critical. The impacted element is the function u_serial of the component usb. Performing manipulation results in null pointer dereference.
This vulnerability is known as CVE-2023-53356. Access to the local network is required for this attack. No exploit is available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.17/6.2.4. The affected element is the function debugfs_lookup. Such manipulation leads to memory leak.
This vulnerability is traded as CVE-2023-53355. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.15.125/6.1.44/6.4.9. Impacted is the function exc_general_protection. This manipulation causes null pointer dereference.
This vulnerability appears as CVE-2023-53352. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.3.3. This issue affects the function drm_sched_fault. The manipulation of the argument timeout_wq results in null pointer dereference.
This vulnerability is reported as CVE-2023-53351. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.22/6.2.9. This vulnerability affects unknown code of the file fs/btrfs/transaction.c of the component btrfs. The manipulation leads to deadlock.
This vulnerability is documented as CVE-2023-53348. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.2.9. This affects the function bcm_tx_setup of the file fs/aio.c. Executing manipulation can lead to uninitialized pointer.
This vulnerability is registered as CVE-2023-53344. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.2.15/6.3.2. Affected by this issue is the function rxrpc_wait_to_be_connected. Performing manipulation results in race condition.
This vulnerability is cataloged as CVE-2023-53345. The attack must originate from the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 5.10.149/5.15.74/5.19.16/6.0.2. Affected by this vulnerability is the function percpu_init_rwsem of the component Bluetooth. Such manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2022-50374. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.0.5. Affected is the function mempool_alloc of the component cifs. This manipulation causes memory leak.
This vulnerability is tracked as CVE-2022-50372. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.3.3. This impacts the function hpriv_release of the component File Descriptor Handler. The manipulation results in uncontrolled file descriptor consumption.
This vulnerability is identified as CVE-2023-53353. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.0.15/6.1.1. It has been rated as critical. This affects the function lpg_brighness_set of the file kernel/locking/mutex.c. The manipulation leads to denial of service.
This vulnerability is referenced as CVE-2022-50371. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.4.9. It has been declared as critical. The impacted element is the function ip6mr_cache_report of the file net/core/skbuff.c of the component ip6mr. Executing manipulation can lead to denial of service.
The identification of this vulnerability is CVE-2023-53365. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.10.172/5.15.98/6.1.15/6.2.2. It has been classified as critical. The affected element is the function ov2740_init_controls of the file media/i2c/ov2740.c of the component media. Performing manipulation results in memory leak.
This vulnerability was named CVE-2023-53349. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.