Show filters
4,186 Total Results
Displaying 101-110 of 4,186
Sort by:
Attacker Value
Unknown
CVE-2021-3975
Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged client with a read-only connection could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash.
0
Attacker Value
Unknown
CVE-2021-3905
Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
0
Attacker Value
Unknown
CVE-2022-34918
Disclosure Date: July 04, 2022 (last updated February 24, 2025)
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
0
Attacker Value
Unknown
CVE-2022-29581
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
0
Attacker Value
Unknown
CVE-2022-1055
Disclosure Date: March 29, 2022 (last updated February 23, 2025)
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
0
Attacker Value
Unknown
CVE-2021-3748
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
0
Attacker Value
Unknown
CVE-2021-3737
Disclosure Date: March 04, 2022 (last updated February 23, 2025)
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2021-3640
Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.
0
Attacker Value
Unknown
CVE-2022-0492
Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
0
Attacker Value
Unknown
CVE-2021-4115
Disclosure Date: February 21, 2022 (last updated February 23, 2025)
There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned
0