CVE-2022-1462
- EPSS 0.05%
- Veröffentlicht 02.06.2022 14:15:32
- Zuletzt bearbeitet 21.11.2024 06:40:46
An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc functi...
CVE-2022-1652
- EPSS 0.75%
- Veröffentlicht 02.06.2022 14:15:32
- Zuletzt bearbeitet 21.11.2024 06:41:10
Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to exe...
CVE-2022-1882
- EPSS 0.04%
- Veröffentlicht 26.05.2022 17:15:08
- Zuletzt bearbeitet 21.11.2024 06:41:40
A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially ...
- EPSS 0.08%
- Veröffentlicht 18.05.2022 17:15:08
- Zuletzt bearbeitet 21.11.2024 06:41:21
A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.
CVE-2022-29581
- EPSS 0.19%
- Veröffentlicht 17.05.2022 17:15:08
- Zuletzt bearbeitet 21.11.2024 06:59:20
Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
CVE-2022-1679
- EPSS 0.05%
- Veröffentlicht 16.05.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:41:14
A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate the...
CVE-2022-30594
- EPSS 0.02%
- Veröffentlicht 12.05.2022 05:15:06
- Zuletzt bearbeitet 21.11.2024 07:02:59
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
CVE-2022-1516
- EPSS 0.04%
- Veröffentlicht 05.05.2022 15:15:07
- Zuletzt bearbeitet 21.11.2024 06:40:52
A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allo...
CVE-2022-1015
- EPSS 1.48%
- Veröffentlicht 29.04.2022 16:15:08
- Zuletzt bearbeitet 21.11.2024 06:39:51
A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.
- EPSS 0.01%
- Veröffentlicht 29.04.2022 16:15:08
- Zuletzt bearbeitet 21.11.2024 06:39:55
A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user t...