This vulnerability allows local attackers to escalate privileges on affected installations of Intel Computing Improvement Program. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-49797.
More Stories
corosync-3.1.9-2.fc40
FEDORA-2025-0bafd025de Packages in this update: corosync-3.1.9-2.fc40 Update description: Security fix for CVE-2025-30472 Read More
varnish-7.5.0-3.fc41
FEDORA-2025-4453f596a8 Packages in this update: varnish-7.5.0-3.fc41 Update description: Security: This update includes fix for VSV00015 aka CVE-2025-30346. Upstream considers this...
corosync-3.1.9-2.fc41
FEDORA-2025-c55f39aeb3 Packages in this update: corosync-3.1.9-2.fc41 Update description: Security fix for CVE-2025-30472 Read More
corosync-3.1.9-3.fc42
FEDORA-2025-a350309ddb Packages in this update: corosync-3.1.9-3.fc42 Update description: Security fix for CVE-2025-30472 Read More
USN-7372-1: Varnish vulnerability
Martin van Kervel Smedshammer discovered that Varnish did not properly sanitize certain HTTP headers. A remote attacker could possibly use...
GitHub Actions Supply Chain Attack
What is the Attack?Recently, a popular third-party GitHub Action tj-actions/changed-files GitHub Action (CVE-2025-30066)- used by over 23,000 repositories- was compromised,...