| CVE | Vendors | Products | Updated | CVSS v3.1 | 
        | In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix bug on trap in smb2_lock
If lock count is greater than 1, flags could be old value.
It should be checked with flags of smb_lock, not flags.
It will cause bug-on trap from locks_free_lock in error handling
routine. | 
    
    
    
        | In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix out-of-bounds in parse_sec_desc()
If osidoffset, gsidoffset and dacloffset could be greater than smb_ntsd
struct size. If it is smaller, It could cause slab-out-of-bounds.
And when validating sid, It need to check it included subauth array size. | 
    
    
    
        | In the Linux kernel, the following vulnerability has been resolved:
HID: corsair-void: Update power supply values with a unified work handler
corsair_void_process_receiver can be called from an interrupt context,
locking battery_mutex in it was causing a kernel panic.
Fix it by moving the critical section into its own work, sharing this
work with battery_add_work and battery_remove_work to remove the need
for any locking | 
    
    
    
        | A vulnerability was detected in Tomofun Furbo 360 up to FB0035_FW_036. Impacted is an unknown function of the component Audio Handler. Performing manipulation results in race condition. The attack is possible to be carried out remotely. The vendor was contacted early about this disclosure but did not respond in any way. | 
    
    
    
        | Microsoft Exchange Server Security Feature Bypass Vulnerability | 
    
    
    
        | Windows Kernel Information Disclosure Vulnerability | 
    
    
    
        | Windows NTFS Elevation of Privilege Vulnerability | 
    
    
    
        | Microsoft DWM Core Library Elevation of Privilege Vulnerability | 
    
    
    
        | Microsoft Exchange Server Elevation of Privilege Vulnerability | 
    
    
    
        | Microsoft Exchange Server Remote Code Execution Vulnerability | 
    
    
    
        | Windows Mark of the Web Security Feature Bypass Vulnerability | 
    
    
    
        | Windows CNG Key Isolation Service Elevation of Privilege Vulnerability | 
    
    
    
        | Windows Scripting Languages Remote Code Execution Vulnerability | 
    
    
    
        | Windows SmartScreen Security Feature Bypass Vulnerability | 
    
    
    
        | Windows Common Log File System Driver Elevation of Privilege Vulnerability | 
    
    
    
        | Windows Print Spooler Elevation of Privilege Vulnerability | 
    
    
    
        | Windows COM+ Event System Service Elevation of Privilege Vulnerability | 
    
    
    
        | Microsoft Exchange Server Elevation of Privilege Vulnerability | 
    
    
    
        | In the Linux kernel, the following vulnerability has been resolved:
ksmbd: transport_ipc: validate payload size before reading handle
handle_response() dereferences the payload as a 4-byte handle without
verifying that the declared payload size is at least 4 bytes. A malformed
or truncated message from ksmbd.mountd can lead to a 4-byte read past the
declared payload size. Validate the size before dereferencing.
This is a minimal fix to guard the initial handle read. | 
    
    
    
        | In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix NULL dereference in ni_write_inode
Syzbot reports a NULL dereference in ni_write_inode.
When creating a new inode, if allocation fails in mi_init function
(called in mi_format_new function), mi->mrec is set to NULL.
In the error path of this inode creation, mi->mrec is later
dereferenced in ni_write_inode.
Add a NULL check to prevent NULL dereference. |