CVE-2021-3483
- EPSS 0.18%
- Veröffentlicht 17.05.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 06:21:39
A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to con...
CVE-2019-25044
- EPSS 0.13%
- Veröffentlicht 14.05.2021 23:15:07
- Zuletzt bearbeitet 21.11.2024 04:39:48
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
CVE-2020-35519
- EPSS 0.17%
- Veröffentlicht 06.05.2021 15:15:07
- Zuletzt bearbeitet 21.11.2024 05:27:29
An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leadin...
CVE-2021-3501
- EPSS 0.04%
- Veröffentlicht 06.05.2021 13:15:12
- Zuletzt bearbeitet 21.11.2024 06:21:41
A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat f...
- EPSS 0.02%
- Veröffentlicht 22.04.2021 18:15:08
- Zuletzt bearbeitet 21.11.2024 05:51:16
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr...
CVE-2021-3506
- EPSS 0.38%
- Veröffentlicht 19.04.2021 22:15:13
- Zuletzt bearbeitet 21.11.2024 06:21:42
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system cras...
CVE-2020-35508
- EPSS 0.05%
- Veröffentlicht 26.03.2021 17:15:12
- Zuletzt bearbeitet 21.11.2024 05:27:27
A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass chec...
CVE-2020-27618
- EPSS 0.03%
- Veröffentlicht 26.02.2021 23:15:11
- Zuletzt bearbeitet 09.06.2025 16:15:31
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an i...
CVE-2020-27825
- EPSS 0.11%
- Veröffentlicht 11.12.2020 19:15:12
- Zuletzt bearbeitet 21.11.2024 05:21:53
A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This fl...
CVE-2020-29660
- EPSS 0.07%
- Veröffentlicht 09.12.2020 17:15:31
- Zuletzt bearbeitet 21.11.2024 05:24:22
A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.