CVE-2021-26931
- EPSS 0.07%
- Veröffentlicht 17.02.2021 02:15:12
- Zuletzt bearbeitet 21.11.2024 05:57:04
An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of g...
CVE-2021-26930
- EPSS 0.08%
- Veröffentlicht 17.02.2021 01:15:13
- Zuletzt bearbeitet 21.11.2024 05:57:04
An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error enco...
CVE-2020-16120
- EPSS 0.06%
- Veröffentlicht 10.02.2021 20:15:15
- Zuletzt bearbeitet 21.11.2024 05:06:48
Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable ...
CVE-2020-24490
- EPSS 4.47%
- Veröffentlicht 02.02.2021 22:15:12
- Zuletzt bearbeitet 21.11.2024 05:14:54
Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
- EPSS 0.1%
- Veröffentlicht 01.02.2021 04:15:14
- Zuletzt bearbeitet 21.11.2024 06:21:21
nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID...
CVE-2021-3347
- EPSS 0.2%
- Veröffentlicht 29.01.2021 17:15:12
- Zuletzt bearbeitet 25.02.2026 18:16:53
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
CVE-2021-3178
- EPSS 0.18%
- Veröffentlicht 19.01.2021 07:15:13
- Zuletzt bearbeitet 21.11.2024 06:21:04
fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirecto...
CVE-2020-16119
- EPSS 0.09%
- Veröffentlicht 14.01.2021 01:15:13
- Zuletzt bearbeitet 21.11.2024 05:06:47
Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-...
CVE-2020-28374
- EPSS 0.31%
- Veröffentlicht 13.01.2021 04:15:12
- Zuletzt bearbeitet 21.11.2024 05:22:41
In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c938...
CVE-2021-0342
- EPSS 0.03%
- Veröffentlicht 11.01.2021 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:42:32
In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Ve...