CVE-2022-20153
- EPSS 0.05%
- Veröffentlicht 15.06.2022 14:15:11
- Zuletzt bearbeitet 21.11.2024 06:42:15
In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitat...
CVE-2022-20154
- EPSS 0.02%
- Veröffentlicht 15.06.2022 14:15:11
- Zuletzt bearbeitet 21.11.2024 06:42:15
In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersi...
CVE-2022-20166
- EPSS 0.02%
- Veröffentlicht 15.06.2022 14:15:11
- Zuletzt bearbeitet 21.11.2024 06:42:16
In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitatio...
CVE-2022-20132
- EPSS 0.08%
- Veröffentlicht 15.06.2022 13:15:08
- Zuletzt bearbeitet 21.11.2024 06:42:13
In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no add...
CVE-2022-32981
- EPSS 0.57%
- Veröffentlicht 10.06.2022 20:15:08
- Zuletzt bearbeitet 21.11.2024 07:07:21
An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.
CVE-2022-21499
- EPSS 0.18%
- Veröffentlicht 09.06.2022 21:15:07
- Zuletzt bearbeitet 21.11.2024 06:44:50
KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is...
CVE-2022-1998
- EPSS 0.13%
- Veröffentlicht 09.06.2022 15:15:09
- Zuletzt bearbeitet 21.11.2024 06:41:55
A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate th...
CVE-2022-32296
- EPSS 0.07%
- Veröffentlicht 05.06.2022 22:15:08
- Zuletzt bearbeitet 21.11.2024 07:06:07
The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.
CVE-2022-32250
- EPSS 1.31%
- Veröffentlicht 02.06.2022 21:15:07
- Zuletzt bearbeitet 21.11.2024 07:06:01
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
CVE-2022-1786
- EPSS 1.15%
- Veröffentlicht 02.06.2022 14:15:33
- Zuletzt bearbeitet 21.11.2024 06:41:28
A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their p...