CVE-2020-35519
- EPSS 0.17%
- Veröffentlicht 06.05.2021 15:15:07
- Zuletzt bearbeitet 21.11.2024 05:27:29
An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leadin...
CVE-2021-3501
- EPSS 0.04%
- Veröffentlicht 06.05.2021 13:15:12
- Zuletzt bearbeitet 21.11.2024 06:21:41
A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat f...
CVE-2021-25215
- EPSS 2.52%
- Veröffentlicht 29.04.2021 01:15:08
- Zuletzt bearbeitet 21.11.2024 05:54:33
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable ...
CVE-2021-25216
- EPSS 16%
- Veröffentlicht 29.04.2021 01:15:08
- Zuletzt bearbeitet 21.11.2024 05:54:33
In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are v...
CVE-2021-25214
- EPSS 1.01%
- Veröffentlicht 29.04.2021 01:15:07
- Zuletzt bearbeitet 21.11.2024 05:54:33
In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, ...
- EPSS 0.08%
- Veröffentlicht 22.04.2021 18:15:08
- Zuletzt bearbeitet 21.11.2024 05:51:16
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr...
CVE-2021-3506
- EPSS 0.38%
- Veröffentlicht 19.04.2021 22:15:13
- Zuletzt bearbeitet 21.11.2024 06:21:42
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system cras...
CVE-2021-29154
- EPSS 0.04%
- Veröffentlicht 08.04.2021 21:15:13
- Zuletzt bearbeitet 21.11.2024 06:00:47
BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.
CVE-2020-35508
- EPSS 0.05%
- Veröffentlicht 26.03.2021 17:15:12
- Zuletzt bearbeitet 21.11.2024 05:27:27
A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass chec...
CVE-2021-28660
- EPSS 0.32%
- Veröffentlicht 17.03.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 06:00:02
rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the ->ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/sta...