Security
Headlines
HeadlinesLatestCVEs

Tag

#dos

CVE-2022-2962: net: tulip: Restrict DMA engine to memories (36a894ae) · Commits · QEMU / QEMU · GitLab

A DMA reentrancy issue was found in the Tulip device emulation in QEMU. When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address. This can cause the device to trigger MMIO handlers multiple times, possibly leading to a stack or heap overflow. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

CVE
#dos#git#auth
CVE-2022-20399: Android Security Bulletin—September 2022  |  Android Open Source Project

In the SEPolicy configuration of system apps, there is a possible access to the 'ip' utility due to an insecure default value. This could lead to local information disclosure of network data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219808546References: Upstream kernel

CVE-2022-34724

Windows DNS Server Denial of Service Vulnerability.

CVE-2022-35838

HTTP V3 Denial of Service Vulnerability.

CVE-2022-38013

.NET Core and Visual Studio Denial of Service Vulnerability.

CVE-2022-30196

Windows Secure Channel Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-35833.

CVE-2022-34720

Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability.

CVE-2022-35833

Windows Secure Channel Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-30196.

CVE-2022-35832

Windows Event Tracing Denial of Service Vulnerability.

RHSA-2022:6506: Red Hat Security Advisory: openvswitch2.16 security update

An update for openvswitch2.13 is now available for Fast Datapath for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-28199: dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service