CVE-2023-53024 – Linux Kernel BPF Speculative Store Bypass Vulnerability
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation To mitigate Spectre v4, 2039f26f3aca (“bpf: Fix leakage due to insufficient speculative store bypass mitigation”) inserts lfence instructions after 1) initializing a stack slot and 2) spilling a pointer to the stack. However, this does […]
CVE-2023-53023 – Linux Kernel NFC Use-After-Free Vulnerability
In the Linux kernel, the following vulnerability has been resolved: net: nfc: Fix use-after-free in local_cleanup() Fix a use-after-free that occurs in kfree_skb() called from local_cleanup(). This could happen when killing nfc daemon (e.g. neard) after detaching an nfc device. When detaching an nfc device, local_cleanup() called from nfc_llcp_unregister_device() frees local->rx_pending and decreases local->ref by […]
CVE-2023-53022 – Enetc Network Driver Deadlock Vulnerability
In the Linux kernel, the following vulnerability has been resolved: net: enetc: avoid deadlock in enetc_tx_onestep_tstamp() This lockdep splat says it better than I could: ================================ WARNING: inconsistent lock state 6.2.0-rc2-07010-ga9b9500ffaac-dirty #967 Not tainted ——————————– inconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W} usage. kworker/1:3/179 [HC0[0]:SC0[0]:HE1:SE1] takes: ffff3ec4036ce098 (_xmit_ETHER#2){+.?.}-{3:3}, at: netif_freeze_queues+0x5c/0xc0 {IN-SOFTIRQ-W} state was registered at: _raw_spin_lock+0x5c/0xc0 sch_direct_xmit+0x148/0x37c __dev_queue_xmit+0x528/0x111c […]
CVE-2023-53021 – Linux Kernel Taprio Qdisc Use-After-Free Vulnerability
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_taprio: fix possible use-after-free syzbot reported a nasty crash [1] in net_tx_action() which made little sense until we got a repro. This repro installs a taprio qdisc, but providing an invalid TCA_RATE attribute. qdisc_create() has to destroy the just initialized taprio qdisc, and taprio_destroy() […]
CVE-2023-53020 – Linux Kernel L2TP UDP Tunnel Sock Racy Registration
The following table lists the changes that have been made to the CVE-2023-53020 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Mar. 27, 2025 Action […]
CVE-2023-53019 – “Qualcomm Snapdragon netMDIO Array Index Out-of-Bounds Vulnerability”
The following table lists the changes that have been made to the CVE-2023-53019 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Mar. 27, 2025 Action […]
The 4 WordPress flaws hackers targeted the most in Q1 2025
The 4 WordPress flaws hackers targeted the most in Q1 2025 A new report sheds light on the most targeted WordPress plugin vulnerabilities hackers used in the first quarter of 2025 to compromise sites. All four flaws are vulnerabilities discovered and fixed in … Read more Published Date: Mar 27, 2025 (4 hours, 19 minutes ago) Vulnerabilities […]
CVE-2025-2855 – Elunez eladmin Deserialization Vulnerability
The following table lists the changes that have been made to the CVE-2025-2855 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 27, 2025 Action […]
CVE-2025-28138 – TOTOLINK A800R Remote Command Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-28138 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 27, 2025 Action […]
CVE-2025-28135 – TOTOLINK A810R Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-28135 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 27, 2025 Action […]