- EPSS 54.32%
- Veröffentlicht 25.03.2022 19:15:10
- Zuletzt bearbeitet 21.11.2024 06:38:37
A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash t...
CVE-2022-0500
- EPSS 0.03%
- Veröffentlicht 25.03.2022 19:15:10
- Zuletzt bearbeitet 21.11.2024 06:38:47
A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges...
CVE-2022-0995
- EPSS 22.29%
- Veröffentlicht 25.03.2022 19:15:10
- Zuletzt bearbeitet 21.11.2024 06:39:49
An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of ser...
- EPSS 0.05%
- Veröffentlicht 25.03.2022 19:15:09
- Zuletzt bearbeitet 21.11.2024 06:37:01
An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash t...
- EPSS 0.09%
- Veröffentlicht 23.03.2022 13:15:07
- Zuletzt bearbeitet 21.11.2024 05:54:34
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also be...
CVE-2022-0635
- EPSS 0.78%
- Veröffentlicht 23.03.2022 12:15:07
- Zuletzt bearbeitet 21.11.2024 06:39:04
Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.
CVE-2022-0396
- EPSS 0.01%
- Veröffentlicht 23.03.2022 11:15:08
- Zuletzt bearbeitet 21.11.2024 06:38:32
BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, eve...
CVE-2022-27666
- EPSS 0.78%
- Veröffentlicht 23.03.2022 06:15:06
- Zuletzt bearbeitet 21.11.2024 06:56:08
A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation ...
CVE-2022-0667
- EPSS 0.69%
- Veröffentlicht 22.03.2022 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:39:08
When the vulnerability is triggered the BIND process will exit. BIND 9.18.0
CVE-2022-1011
- EPSS 0.22%
- Veröffentlicht 18.03.2022 18:15:12
- Zuletzt bearbeitet 21.11.2024 06:39:51
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.