CVE-2022-20423
- EPSS 0.05%
- Veröffentlicht 11.10.2022 20:15:12
- Zuletzt bearbeitet 21.11.2024 06:42:47
In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interact...
CVE-2022-20409
- EPSS 5.61%
- Veröffentlicht 11.10.2022 20:15:11
- Zuletzt bearbeitet 21.11.2024 06:42:45
In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: An...
CVE-2022-42703
- EPSS 0.88%
- Veröffentlicht 09.10.2022 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:25:10
mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
CVE-2022-3435
- EPSS 0.07%
- Veröffentlicht 08.10.2022 11:15:10
- Zuletzt bearbeitet 21.11.2024 07:19:30
A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initi...
CVE-2022-41849
- EPSS 0.02%
- Veröffentlicht 30.09.2022 06:15:12
- Zuletzt bearbeitet 21.11.2024 07:23:56
drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_di...
CVE-2022-41850
- EPSS 0.04%
- Veröffentlicht 30.09.2022 06:15:12
- Zuletzt bearbeitet 21.11.2024 07:23:56
roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress.
CVE-2022-41848
- EPSS 0.03%
- Veröffentlicht 30.09.2022 06:15:11
- Zuletzt bearbeitet 20.05.2025 20:15:27
drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgsl...
CVE-2022-3303
- EPSS 0.02%
- Veröffentlicht 27.09.2022 23:15:15
- Zuletzt bearbeitet 21.05.2025 16:15:28
A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use t...
CVE-2022-2785
- EPSS 0.11%
- Veröffentlicht 23.09.2022 11:15:09
- Zuletzt bearbeitet 14.04.2026 15:23:49
There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbit...
- EPSS 0.02%
- Veröffentlicht 21.09.2022 08:15:09
- Zuletzt bearbeitet 28.05.2025 16:15:28
mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.