CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.
This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.
Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js. |
In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c. |
A logic issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.8, macOS Monterey 12.5, Security Update 2022-005 Catalina. An archive may be able to bypass Gatekeeper. |
Azure CycleCloud Elevation of Privilege Vulnerability |
Windows LockDown Policy (WLDP) Security Feature Bypass Vulnerability |
BitLocker Security Feature Bypass Vulnerability |
In the Linux kernel, the following vulnerability has been resolved:
selinux: ignore unknown extended permissions
When evaluating extended permissions, ignore unknown permissions instead
of calling BUG(). This commit ensures that future permissions can be
added without interfering with older kernels. |
In the Linux kernel, the following vulnerability has been resolved:
x86/fred: Clear WFE in missing-ENDBRANCH #CPs
An indirect branch instruction sets the CPU indirect branch tracker
(IBT) into WAIT_FOR_ENDBRANCH (WFE) state and WFE stays asserted
across the instruction boundary. When the decoder finds an
inappropriate instruction while WFE is set ENDBR, the CPU raises a #CP
fault.
For the "kernel IBT no ENDBR" selftest where #CPs are deliberately
triggered, the WFE state of the interrupted context needs to be
cleared to let execution continue. Otherwise when the CPU resumes
from the instruction that just caused the previous #CP, another
missing-ENDBRANCH #CP is raised and the CPU enters a dead loop.
This is not a problem with IDT because it doesn't preserve WFE and
IRET doesn't set WFE. But FRED provides space on the entry stack
(in an expanded CS area) to save and restore the WFE state, thus the
WFE state is no longer clobbered, so software must clear it.
Clear WFE to avoid dead looping in ibt_clear_fred_wfe() and the
!ibt_fatal code path when execution is allowed to continue.
Clobbering WFE in any other circumstance is a security-relevant bug.
[ dhansen: changelog rewording ] |
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability |
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability |
Secure Boot Security Feature Bypass Vulnerability |
Secure Boot Security Feature Bypass Vulnerability |
Secure Boot Security Feature Bypass Vulnerability |
Secure Boot Security Feature Bypass Vulnerability |
Secure Boot Security Feature Bypass Vulnerability |
BitLocker Security Feature Bypass Vulnerability |
Secure Boot Security Feature Bypass Vulnerability |
Microsoft Bing Search Spoofing Vulnerability |
Windows Mark of the Web Security Feature Bypass Vulnerability |
User login brute force protection functionality bypass
|