NetApp Hci Storage Nodes
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in NetApp Hci Storage Nodes.
By the Year
In 2025 there have been 0 vulnerabilities in NetApp Hci Storage Nodes. Hci Storage Nodes did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 0 | 0.00 |
2023 | 1 | 8.10 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 1 | 6.70 |
2019 | 0 | 0.00 |
2018 | 1 | 9.80 |
It may take a day or so for new Hci Storage Nodes vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent NetApp Hci Storage Nodes Security Vulnerabilities
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server
CVE-2023-32250
8.1 - High
- July 10, 2023
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Race Condition
usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free
CVE-2020-12464
6.7 - Medium
- April 29, 2020
usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.
Dangling pointer
In Eclipse Jetty
CVE-2017-7657
9.8 - Critical
- June 26, 2018
In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
Integer Overflow or Wraparound
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3
CVE-2016-5195
7 - High
- November 10, 2016
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Race Condition
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for NetApp Oncommand Unified Manager Clustered Data Ontap or by NetApp? Click the Watch button to subscribe.
