CVE-2024-6387
- EPSS 38.58%
- Published 01.07.2024 13:15:06
- Last modified 30.09.2025 13:52:23
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to aut...
CVE-2024-26733
- EPSS 0.01%
- Published 03.04.2024 17:15:51
- Last modified 17.03.2025 16:02:47
In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_req_get(). syzkaller reported an overflown write in arp_req_get(). [0] When ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour entry and c...
- EPSS 0.02%
- Published 27.03.2023 21:15:10
- Last modified 21.11.2024 07:38:24
In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,...
CVE-2022-36879
- EPSS 0.04%
- Published 27.07.2022 04:15:10
- Last modified 05.05.2025 16:15:17
An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.
CVE-2022-1473
- EPSS 0.28%
- Published 03.05.2022 16:15:18
- Last modified 05.05.2025 17:17:34
The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically de...
CVE-2022-1434
- EPSS 0.06%
- Published 03.05.2022 16:15:18
- Last modified 21.11.2024 06:40:43
The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being s...
CVE-2022-1343
- EPSS 0.13%
- Published 03.05.2022 16:15:18
- Last modified 05.05.2025 17:17:34
The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the res...
- EPSS 46.34%
- Published 03.05.2022 16:15:18
- Last modified 13.08.2025 14:15:28
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execut...
CVE-2021-4203
- EPSS 0.07%
- Published 25.03.2022 19:15:09
- Last modified 21.11.2024 06:37:08
A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak in...
CVE-2020-35508
- EPSS 0.05%
- Published 26.03.2021 17:15:12
- Last modified 21.11.2024 05:27:27
A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass chec...