CVE-2021-27365
- EPSS 0.34%
- Veröffentlicht 07.03.2021 05:15:13
- Zuletzt bearbeitet 21.11.2024 05:57:50
An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated wit...
CVE-2021-27363
- EPSS 0.04%
- Veröffentlicht 07.03.2021 04:15:13
- Zuletzt bearbeitet 21.11.2024 05:57:50
An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is availab...
CVE-2021-28038
- EPSS 0.06%
- Veröffentlicht 05.03.2021 18:15:13
- Zuletzt bearbeitet 21.11.2024 05:59:01
An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping error...
CVE-2021-26932
- EPSS 0.19%
- Veröffentlicht 17.02.2021 02:15:13
- Zuletzt bearbeitet 21.11.2024 05:57:04
An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to ...
CVE-2021-26931
- EPSS 0.07%
- Veröffentlicht 17.02.2021 02:15:12
- Zuletzt bearbeitet 21.11.2024 05:57:04
An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of g...
CVE-2021-26930
- EPSS 0.08%
- Veröffentlicht 17.02.2021 01:15:13
- Zuletzt bearbeitet 21.11.2024 05:57:04
An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error enco...
CVE-2020-16120
- EPSS 0.06%
- Veröffentlicht 10.02.2021 20:15:15
- Zuletzt bearbeitet 21.11.2024 05:06:48
Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable ...
CVE-2020-24490
- EPSS 4.47%
- Veröffentlicht 02.02.2021 22:15:12
- Zuletzt bearbeitet 21.11.2024 05:14:54
Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
- EPSS 0.1%
- Veröffentlicht 01.02.2021 04:15:14
- Zuletzt bearbeitet 21.11.2024 06:21:21
nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID...
CVE-2021-3347
- EPSS 0.2%
- Veröffentlicht 29.01.2021 17:15:12
- Zuletzt bearbeitet 25.02.2026 18:16:53
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.