![]() Impact: An app may be able to determine kernel memory layoutĭescription: An information disclosure issue was addressed by removing the vulnerable code.ĬVE-2023-23502: Pan ZhenPeng of STAR Labs SG Pte. Impact: An app may be able to execute arbitrary code with kernel privilegesĭescription: A type confusion issue was addressed with improved checks.ĬVE-2022-32915: Tommy Muir Graphics Driverĭescription: The issue was addressed with improved bounds checks.ĭescription: The issue was addressed with improved memory handling.ĬVE-2023-23516: Jordy Zomer added May 11, 2023 Impact: An encrypted volume may be unmounted and remounted by a different user without prompting for the passwordĭescription: A logic issue was addressed with improved state management.ĬVE-2023-23493: Oliver Norpoth of KLIXX GmbH () Impact: Mounting a maliciously crafted Samba network share may lead to arbitrary code executionĭescription: A buffer overflow issue was addressed with improved memory handling.ĬVE-2023-23513: Dimitrios Tatsis and Aleksandar Nikolic of Cisco Talos Impact: An app may be able to access user-sensitive dataĭescription: This issue was addressed by enabling hardened runtime.ĬVE-2023-23499: Wojciech Reguła of SecuRing (wojciechregula.blog)ĭescription: Multiple issues were addressed by updating to curl version 7.86.0.ĭescription: Multiple issues were addressed by updating to curl version 7.85.0.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |