Through AI-driven code conversion and a layered infection chain involving different file formats and scripting languages, the threat actors behind Water Saci are quickly upgrading their malware delivery and propagation methods across WhatsApp in Brazil.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.1.30/6.3.4. The impacted element is the function fuel_gauge_external_power_changed. This manipulation of the argument psy causes null pointer dereference.
The identification of this vulnerability is CVE-2023-53310. The attack needs to be done within the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.38/6.4.3. This issue affects the function skb_transport_offset in the library include/linux/skbuff.h of the component net. The manipulation results in information disclosure.
This vulnerability is cataloged as CVE-2023-53312. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.1.1 and classified as critical. Affected is the function tifm_7xx1_switch_media. The manipulation results in memory leak.
This vulnerability is known as CVE-2022-50349. Access to the local network is required for this attack. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.0.15/6.1.1. It has been classified as critical. Affected by this vulnerability is the function iscsi_target_sk_data_ready. This manipulation causes null pointer dereference.
This vulnerability is handled as CVE-2022-50350. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.3.3. Affected is the function pm_runtime_get. The manipulation leads to allocation of resources.
This vulnerability is documented as CVE-2023-53308. The attack requires being on the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.4.10. It has been declared as critical. This impacts the function nilfs_detach_log_writer of the component nilfs2. The manipulation results in use after free.
This vulnerability was named CVE-2023-53311. The attack needs to be approached within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.2.2. This vulnerability affects the function do_rbd_add of the component rbd. The manipulation leads to use after free.
This vulnerability is listed as CVE-2023-53307. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.0.5 and classified as critical. Affected by this issue is the function hnae_ae_register. This manipulation causes memory leak.
This vulnerability appears as CVE-2022-50352. The attacker needs to be present on the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 5.10.189/5.15.123/6.1.42/6.4.7 and classified as critical. This affects the function rbe_prev of the component netfilter. Such manipulation leads to excessive iteration.
This vulnerability is traded as CVE-2023-53304. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.15.75/6.0.5. This affects the function cifs_create of the component cifs. Performing manipulation results in memory leak.
This vulnerability is cataloged as CVE-2022-50351. The attack must originate from the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.4.6. It has been classified as critical. This vulnerability affects the function radeon_cs_parser_init. Performing manipulation results in integer overflow.
This vulnerability is known as CVE-2023-53309. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.2.10. The impacted element is the function invalidate_inode_pages2_range of the file fs/dax.c of the component fsdax. Performing manipulation results in privilege escalation.
This vulnerability is reported as CVE-2023-53306. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.