CVE-2021-42252
- EPSS 0.09%
- Veröffentlicht 11.10.2021 19:15:07
- Zuletzt bearbeitet 21.11.2024 06:27:27
An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute pr...
CVE-2021-42008
- EPSS 0.93%
- Veröffentlicht 05.10.2021 00:15:07
- Zuletzt bearbeitet 21.11.2024 06:27:03
The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.
CVE-2021-41864
- EPSS 0.03%
- Veröffentlicht 02.10.2021 00:15:07
- Zuletzt bearbeitet 21.11.2024 06:26:55
prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.
CVE-2021-22947
- EPSS 0.19%
- Veröffentlicht 29.09.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:50:59
When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not ...
CVE-2021-22946
- EPSS 0.07%
- Veröffentlicht 29.09.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:50:59
A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This ...
CVE-2021-22945
- EPSS 0.35%
- Veröffentlicht 23.09.2021 13:15:08
- Zuletzt bearbeitet 09.06.2025 15:15:25
When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.
CVE-2021-22924
- EPSS 0.75%
- Veröffentlicht 05.08.2021 21:15:11
- Zuletzt bearbeitet 09.06.2025 15:15:24
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the invo...
CVE-2021-3612
- EPSS 0.09%
- Veröffentlicht 09.07.2021 11:15:09
- Zuletzt bearbeitet 21.11.2024 06:21:58
An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privi...
CVE-2021-22901
- EPSS 0.34%
- Veröffentlicht 11.06.2021 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:50:52
curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentia...
CVE-2021-22897
- EPSS 1.08%
- Veröffentlicht 11.06.2021 16:15:10
- Zuletzt bearbeitet 21.11.2024 05:50:51
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" ...