CVE-2025-4598
- EPSS 0.05%
- Published 30.05.2025 13:13:26
- Last modified 27.08.2025 17:16:21
A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, suc...
CVE-2022-21546
- EPSS 0.07%
- Published 02.05.2025 21:52:09
- Last modified 04.06.2025 13:15:24
In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix WRITE_SAME No Data Buffer crash In newer version of the SBC specs, we have a NDOB bit that indicates there is no data buffer that gets written out. If this bit is...
CVE-2022-21505
- EPSS 0.05%
- Published 24.12.2024 19:15:06
- Last modified 18.06.2025 20:42:10
In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Sec...
CVE-2023-22024
- EPSS 0.04%
- Published 20.09.2023 21:15:11
- Last modified 21.11.2024 07:44:07
In the Unbreakable Enterprise Kernel (UEK), the RDS module in UEK has two setsockopt(2) options, RDS_CONN_RESET and RDS6_CONN_RESET, that are not re-entrant. A malicious local user with CAP_NET_ADMIN can use this to crash the kernel. CVSS 3.1 Base S...
CVE-2022-21385
- EPSS 0.03%
- Published 29.08.2022 21:15:09
- Last modified 21.11.2024 06:44:34
A flaw in net_rds_alloc_sgs() in Oracle Linux kernels allows unprivileged local users to crash the machine. CVSS 3.1 Base Score 6.2 (Availability impacts). CVSS Vector (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVE-2022-21504
- EPSS 0.08%
- Published 14.06.2022 18:15:08
- Last modified 21.11.2024 06:44:50
The code in UEK6 U3 was missing an appropiate file descriptor count to be missing. This resulted in a use count error that allowed a file descriptor to a socket to be closed and freed while it was still in use by another portion of the kernel. An att...
CVE-2022-21499
- EPSS 0.14%
- Published 09.06.2022 21:15:07
- Last modified 21.11.2024 06:44:50
KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is...
CVE-2021-3551
- EPSS 0.02%
- Published 16.02.2022 17:15:11
- Last modified 21.11.2024 06:21:49
A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privile...
CVE-2021-2464
- EPSS 0.06%
- Published 24.09.2021 19:15:07
- Last modified 21.11.2024 06:03:10
Vulnerability in Oracle Linux (component: OSwatcher). Supported versions that are affected are 7 and 8. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Linux executes to compromise Oracle ...
CVE-2018-17962
- EPSS 0.27%
- Published 09.10.2018 22:29:00
- Last modified 21.11.2024 03:55:17
Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.