2023-08-11
|
CVE-2022-38076
|
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
|
Debian_linux, Fedora, Killer, Proset\/wireless_wifi, Uefi_firmware
|
7.8
|
|
|
2023-08-11
|
CVE-2022-40964
|
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
|
Debian_linux, Fedora, Killer, Proset\/wireless_wifi, Uefi_firmware
|
6.7
|
|
|
2023-08-11
|
CVE-2022-41804
|
Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
|
Debian_linux, Fedora, Xeon_bronze_3408u_firmware, Xeon_d\-1513n_firmware, Xeon_d\-1518_firmware, Xeon_d\-1520_firmware, Xeon_d\-1521_firmware, Xeon_d\-1523n_firmware, Xeon_d\-1527_firmware, Xeon_d\-1528_firmware, Xeon_d\-1529_firmware, Xeon_d\-1531_firmware, Xeon_d\-1533n_firmware, Xeon_d\-1537_firmware, Xeon_d\-1539_firmware, Xeon_d\-1540_firmware, Xeon_d\-1541_firmware, Xeon_d\-1543n_firmware, Xeon_d\-1548_firmware, Xeon_d\-1553n_firmware, Xeon_d\-1557_firmware, Xeon_d\-1559_firmware, Xeon_d\-1567_firmware, Xeon_d\-1571_firmware, Xeon_d\-1577_firmware, Xeon_d\-1602_firmware, Xeon_d\-1622_firmware, Xeon_d\-1623n_firmware, Xeon_d\-1627_firmware, Xeon_d\-1633n_firmware, Xeon_d\-1637_firmware, Xeon_d\-1649n_firmware, Xeon_d\-1653n_firmware, Xeon_d\-1702_firmware, Xeon_d\-1712tr_firmware, Xeon_d\-1713nt_firmware, Xeon_d\-1713nte_firmware, Xeon_d\-1714_firmware, Xeon_d\-1715ter_firmware, Xeon_d\-1718t_firmware, Xeon_d\-1722ne_firmware, Xeon_d\-1726_firmware, Xeon_d\-1732te_firmware, Xeon_d\-1733nt_firmware, Xeon_d\-1734nt_firmware, Xeon_d\-1735tr_firmware, Xeon_d\-1736_firmware, Xeon_d\-1736nt_firmware, Xeon_d\-1739_firmware, Xeon_d\-1746ter_firmware, Xeon_d\-1747nte_firmware, Xeon_d\-1748te_firmware, Xeon_d\-1749nt_firmware, Xeon_d\-2123it_firmware, Xeon_d\-2141i_firmware, Xeon_d\-2142it_firmware, Xeon_d\-2143it_firmware, Xeon_d\-2145nt_firmware, Xeon_d\-2146nt_firmware, Xeon_d\-2161i_firmware, Xeon_d\-2163it_firmware, Xeon_d\-2166nt_firmware, Xeon_d\-2173it_firmware, Xeon_d\-2177nt_firmware, Xeon_d\-2183it_firmware, Xeon_d\-2187nt_firmware, Xeon_d\-2712t_firmware, Xeon_d\-2733nt_firmware, Xeon_d\-2738_firmware, Xeon_d\-2745nx_firmware, Xeon_d\-2752nte_firmware, Xeon_d\-2752ter_firmware, Xeon_d\-2753nt_firmware, Xeon_d\-2757nx_firmware, Xeon_d\-2766nt_firmware, Xeon_d\-2775te_firmware, Xeon_d\-2776nt_firmware, Xeon_d\-2777nx_firmware, Xeon_d\-2779_firmware, Xeon_d\-2786nte_firmware, Xeon_d\-2795nt_firmware, Xeon_d\-2796nt_firmware, Xeon_d\-2796te_firmware, Xeon_d\-2798nt_firmware, Xeon_d\-2798nx_firmware, Xeon_d\-2799_firmware, Xeon_gold_5315y_firmware, Xeon_gold_5317_firmware, Xeon_gold_5318h_firmware, Xeon_gold_5318n_firmware, Xeon_gold_5318s_firmware, Xeon_gold_5318y_firmware, Xeon_gold_5320_firmware, Xeon_gold_5320h_firmware, Xeon_gold_5320t_firmware, Xeon_gold_5411n_firmware, Xeon_gold_5412u_firmware, Xeon_gold_5415\+_firmware, Xeon_gold_5416s_firmware, Xeon_gold_5418n_firmware, Xeon_gold_5418y_firmware, Xeon_gold_5420\+_firmware, Xeon_gold_5423n_firmware, Xeon_gold_5433n_firmware, Xeon_gold_6312u_firmware, Xeon_gold_6314u_firmware, Xeon_gold_6326_firmware, Xeon_gold_6328h_firmware, Xeon_gold_6328hl_firmware, Xeon_gold_6330_firmware, Xeon_gold_6330h_firmware, Xeon_gold_6330n_firmware, Xeon_gold_6334_firmware, Xeon_gold_6336y_firmware, Xeon_gold_6338_firmware, Xeon_gold_6338n_firmware, Xeon_gold_6338t_firmware, Xeon_gold_6342_firmware, Xeon_gold_6346_firmware, Xeon_gold_6348_firmware, Xeon_gold_6348h_firmware, Xeon_gold_6354_firmware, Xeon_gold_6403n_firmware, Xeon_gold_6414u_firmware, Xeon_gold_6416h_firmware, Xeon_gold_6418h_firmware, Xeon_gold_6421n_firmware, Xeon_gold_6423n_firmware, Xeon_gold_6426y_firmware, Xeon_gold_6428n_firmware, Xeon_gold_6430_firmware, Xeon_gold_6433n_firmware, Xeon_gold_6433ne_firmware, Xeon_gold_6434_firmware, Xeon_gold_6434h_firmware, Xeon_gold_6438m_firmware, Xeon_gold_6438n_firmware, Xeon_gold_6438y\+_firmware, Xeon_gold_6442y_firmware, Xeon_gold_6443n_firmware, Xeon_gold_6444y_firmware, Xeon_gold_6448h_firmware, Xeon_gold_6448y_firmware, Xeon_gold_6454s_firmware, Xeon_gold_6458q_firmware, Xeon_platinum_8351n_firmware, Xeon_platinum_8352m_firmware, Xeon_platinum_8352s_firmware, Xeon_platinum_8352v_firmware, Xeon_platinum_8352y_firmware, Xeon_platinum_8353h_firmware, Xeon_platinum_8354h_firmware, Xeon_platinum_8356h_firmware, Xeon_platinum_8358_firmware, Xeon_platinum_8358p_firmware, Xeon_platinum_8360h_firmware, Xeon_platinum_8360hl_firmware, Xeon_platinum_8360y_firmware, Xeon_platinum_8362_firmware, Xeon_platinum_8368_firmware, Xeon_platinum_8368q_firmware, Xeon_platinum_8376h_firmware, Xeon_platinum_8376hl_firmware, Xeon_platinum_8380_firmware, Xeon_platinum_8380h_firmware, Xeon_platinum_8380hl_firmware, Xeon_platinum_8444h_firmware, Xeon_platinum_8450h_firmware, Xeon_platinum_8452y_firmware, Xeon_platinum_8454h_firmware, Xeon_platinum_8458p_firmware, Xeon_platinum_8460h_firmware, Xeon_platinum_8460y\+_firmware, Xeon_platinum_8461v_firmware, Xeon_platinum_8462y\+_firmware, Xeon_platinum_8468_firmware, Xeon_platinum_8468h_firmware, Xeon_platinum_8468v_firmware, Xeon_platinum_8470_firmware, Xeon_platinum_8470n_firmware, Xeon_platinum_8470q_firmware, Xeon_platinum_8471n_firmware, Xeon_platinum_8480\+_firmware, Xeon_platinum_8490h_firmware, Xeon_silver_4309y_firmware, Xeon_silver_4310_firmware, Xeon_silver_4310t_firmware, Xeon_silver_4314_firmware, Xeon_silver_4316_firmware, Xeon_silver_4410t_firmware, Xeon_silver_4410y_firmware, Xeon_silver_4416\+_firmware
|
6.7
|
|
|
2023-08-11
|
CVE-2022-46329
|
Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
|
Debian_linux, Fedora, Killer, Proset\/wireless_wifi, Uefi_firmware
|
6.7
|
|
|
2023-08-11
|
CVE-2023-23908
|
Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.
|
Debian_linux, Fedora, Microcode, Xeon_d\-1513n_firmware, Xeon_d\-1518_firmware, Xeon_d\-1520_firmware, Xeon_d\-1521_firmware, Xeon_d\-1523n_firmware, Xeon_d\-1527_firmware, Xeon_d\-1528_firmware, Xeon_d\-1529_firmware, Xeon_d\-1531_firmware, Xeon_d\-1533n_firmware, Xeon_d\-1537_firmware, Xeon_d\-1539_firmware, Xeon_d\-1540_firmware, Xeon_d\-1541_firmware, Xeon_d\-1543n_firmware, Xeon_d\-1548_firmware, Xeon_d\-1553n_firmware, Xeon_d\-1557_firmware, Xeon_d\-1559_firmware, Xeon_d\-1567_firmware, Xeon_d\-1571_firmware, Xeon_d\-1577_firmware, Xeon_d\-1602_firmware, Xeon_d\-1622_firmware, Xeon_d\-1623n_firmware, Xeon_d\-1627_firmware, Xeon_d\-1633n_firmware, Xeon_d\-1637_firmware, Xeon_d\-1649n_firmware, Xeon_d\-1653n_firmware, Xeon_d\-1702_firmware, Xeon_d\-1712tr_firmware, Xeon_d\-1713nt_firmware, Xeon_d\-1713nte_firmware, Xeon_d\-1714_firmware, Xeon_d\-1715ter_firmware, Xeon_d\-1718t_firmware, Xeon_d\-1722ne_firmware, Xeon_d\-1726_firmware, Xeon_d\-1732te_firmware, Xeon_d\-1733nt_firmware, Xeon_d\-1734nt_firmware, Xeon_d\-1735tr_firmware, Xeon_d\-1736_firmware, Xeon_d\-1736nt_firmware, Xeon_d\-1739_firmware, Xeon_d\-1746ter_firmware, Xeon_d\-1747nte_firmware, Xeon_d\-1748te_firmware, Xeon_d\-1749nt_firmware, Xeon_d\-2123it_firmware, Xeon_d\-2141i_firmware, Xeon_d\-2142it_firmware, Xeon_d\-2143it_firmware, Xeon_d\-2145nt_firmware, Xeon_d\-2146nt_firmware, Xeon_d\-2161i_firmware, Xeon_d\-2163it_firmware, Xeon_d\-2166nt_firmware, Xeon_d\-2173it_firmware, Xeon_d\-2177nt_firmware, Xeon_d\-2183it_firmware, Xeon_d\-2187nt_firmware, Xeon_d\-2712t_firmware, Xeon_d\-2733nt_firmware, Xeon_d\-2738_firmware, Xeon_d\-2745nx_firmware, Xeon_d\-2752nte_firmware, Xeon_d\-2752ter_firmware, Xeon_d\-2753nt_firmware, Xeon_d\-2757nx_firmware, Xeon_d\-2766nt_firmware, Xeon_d\-2775te_firmware, Xeon_d\-2776nt_firmware, Xeon_d\-2777nx_firmware, Xeon_d\-2779_firmware, Xeon_d\-2786nte_firmware, Xeon_d\-2795nt_firmware, Xeon_d\-2796nt_firmware, Xeon_d\-2796te_firmware, Xeon_d\-2798nt_firmware, Xeon_d\-2798nx_firmware, Xeon_d\-2799_firmware, Xeon_gold_5315y_firmware, Xeon_gold_5317_firmware, Xeon_gold_5318h_firmware, Xeon_gold_5318n_firmware, Xeon_gold_5318s_firmware, Xeon_gold_5318y_firmware, Xeon_gold_5320_firmware, Xeon_gold_5320h_firmware, Xeon_gold_5320t_firmware, Xeon_gold_6312u_firmware, Xeon_gold_6314u_firmware, Xeon_gold_6326_firmware, Xeon_gold_6328h_firmware, Xeon_gold_6328hl_firmware, Xeon_gold_6330_firmware, Xeon_gold_6330h_firmware, Xeon_gold_6330n_firmware, Xeon_gold_6334_firmware, Xeon_gold_6336y_firmware, Xeon_gold_6338_firmware, Xeon_gold_6338n_firmware, Xeon_gold_6338t_firmware, Xeon_gold_6342_firmware, Xeon_gold_6346_firmware, Xeon_gold_6348_firmware, Xeon_gold_6348h_firmware, Xeon_gold_6354_firmware, Xeon_platinum_8351n_firmware, Xeon_platinum_8352m_firmware, Xeon_platinum_8352s_firmware, Xeon_platinum_8352v_firmware, Xeon_platinum_8352y_firmware, Xeon_platinum_8353h_firmware, Xeon_platinum_8354h_firmware, Xeon_platinum_8356h_firmware, Xeon_platinum_8358_firmware, Xeon_platinum_8358p_firmware, Xeon_platinum_8360h_firmware, Xeon_platinum_8360hl_firmware, Xeon_platinum_8360y_firmware, Xeon_platinum_8362_firmware, Xeon_platinum_8368_firmware, Xeon_platinum_8368q_firmware, Xeon_platinum_8376h_firmware, Xeon_platinum_8376hl_firmware, Xeon_platinum_8380_firmware, Xeon_platinum_8380h_firmware, Xeon_platinum_8380hl_firmware, Xeon_silver_4309y_firmware, Xeon_silver_4310_firmware, Xeon_silver_4310t_firmware, Xeon_silver_4314_firmware, Xeon_silver_4316_firmware
|
4.4
|
|
|
2023-08-11
|
CVE-2023-39417
|
IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.
|
Debian_linux, Postgresql, Enterprise_linux, Software_collections
|
8.8
|
|
|
2023-08-11
|
CVE-2023-39534
|
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.10.0, 2.9.2, and 2.6.5, a malformed GAP submessage can trigger assertion failure, crashing FastDDS. Version 2.10.0, 2.9.2, and 2.6.5 contain a patch for this issue.
|
Debian_linux, Fast_dds
|
7.5
|
|
|
2023-08-11
|
CVE-2023-39945
|
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.11.0, 2.10.2, 2.9.2, and 2.6.5, a data submessage sent to PDP port raises unhandled `BadParamException` in fastcdr, which in turn crashes fastdds. Versions 2.11.0, 2.10.2, 2.9.2, and 2.6.5 contain a patch for this issue.
|
Debian_linux, Fast_dds
|
7.5
|
|
|
2023-08-11
|
CVE-2023-39946
|
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6, heap can be overflowed by providing a PID_PROPERTY_LIST parameter that contains a CDR string with length larger than the size of actual content. In `eprosima::fastdds::dds::ParameterPropertyList_t::push_back_helper`, `memcpy` is called to first copy the octet'ized length and then to copy the data into `properties_.data`. At...
|
Debian_linux, Fast_dds
|
7.5
|
|
|
2023-08-11
|
CVE-2023-39947
|
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6, even after the fix at commit 3492270, malformed `PID_PROPERTY_LIST` parameters cause heap overflow at a different program counter. This can remotely crash any Fast-DDS process. Versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6 contain a patch for this issue.
|
Debian_linux, Fast_dds
|
7.5
|
|
|