CVE-2024-6387
- EPSS 38.58%
- Published 01.07.2024 13:15:06
- Last modified 30.09.2025 13:52:23
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to aut...
CVE-2024-26733
- EPSS 0.01%
- Published 03.04.2024 17:15:51
- Last modified 17.03.2025 16:02:47
In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_req_get(). syzkaller reported an overflown write in arp_req_get(). [0] When ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour entry and c...
CVE-2024-26735
- EPSS 0.03%
- Published 03.04.2024 17:15:51
- Last modified 17.03.2025 16:05:01
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.
- EPSS 0.02%
- Published 27.03.2023 21:15:10
- Last modified 21.11.2024 07:38:24
In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,...
CVE-2022-30594
- EPSS 0.03%
- Published 12.05.2022 05:15:06
- Last modified 21.11.2024 07:02:59
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
CVE-2022-0742
- EPSS 2.19%
- Published 18.03.2022 12:15:07
- Last modified 21.11.2024 06:39:18
Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.
CVE-2020-29660
- EPSS 0.07%
- Published 09.12.2020 17:15:31
- Last modified 21.11.2024 05:24:22
A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.
CVE-2020-29661
- EPSS 0.22%
- Published 09.12.2020 17:15:31
- Last modified 21.11.2024 05:24:23
A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
CVE-2020-15025
- EPSS 1.89%
- Published 24.06.2020 19:15:10
- Last modified 21.11.2024 05:04:38
ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC alg...
CVE-2020-8835
- EPSS 24.72%
- Published 02.04.2020 18:15:18
- Last modified 21.11.2024 05:39:32
In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5....