Show filters
43 Total Results
Displaying 11-20 of 43
Sort by:
Attacker Value
Unknown

CVE-2022-41222

Disclosure Date: September 21, 2022 (last updated November 29, 2024)
mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.
Attacker Value
Unknown

CVE-2022-28390

Disclosure Date: April 03, 2022 (last updated October 07, 2023)
ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.
Attacker Value
Unknown

CVE-2021-41864

Disclosure Date: October 02, 2021 (last updated November 08, 2023)
prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.
Attacker Value
Unknown

CVE-2019-25045

Disclosure Date: June 07, 2021 (last updated November 28, 2024)
An issue was discovered in the Linux kernel before 5.0.19. The XFRM subsystem has a use-after-free, related to an xfrm_state_fini panic, aka CID-dbb2483b2a46.
Attacker Value
Unknown

CVE-2020-25669

Disclosure Date: May 26, 2021 (last updated November 08, 2023)
A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
Attacker Value
Unknown

CVE-2020-25668

Disclosure Date: May 26, 2021 (last updated November 08, 2023)
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
Attacker Value
Unknown

CVE-2019-25044

Disclosure Date: May 14, 2021 (last updated November 28, 2024)
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
Attacker Value
Unknown

CVE-2021-23133

Disclosure Date: April 13, 2021 (last updated November 08, 2023)
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.
Attacker Value
Unknown

CVE-2021-26708

Disclosure Date: February 05, 2021 (last updated November 10, 2023)
A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.
Attacker Value
Unknown

CVE-2020-29370

Disclosure Date: November 28, 2020 (last updated February 22, 2025)
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.