Show filters
310 Total Results
Displaying 111-120 of 310
Sort by:
Attacker Value
Unknown
CVE-2022-39046
Disclosure Date: August 31, 2022 (last updated February 24, 2025)
An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the heap.
0
Attacker Value
Unknown
CVE-2022-2961
Disclosure Date: August 29, 2022 (last updated February 24, 2025)
A use-after-free flaw was found in the Linux kernel’s PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
0
Attacker Value
Unknown
CVE-2022-1199
Disclosure Date: August 29, 2022 (last updated February 24, 2025)
A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.
0
Attacker Value
Unknown
CVE-2021-4204
Disclosure Date: August 24, 2022 (last updated February 24, 2025)
An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.
0
Attacker Value
Unknown
CVE-2021-3998
Disclosure Date: August 24, 2022 (last updated February 24, 2025)
A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.
0
Attacker Value
Unknown
CVE-2021-3999
Disclosure Date: August 24, 2022 (last updated February 24, 2025)
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
0
Attacker Value
Unknown
CVE-2022-2938
Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.
0
Attacker Value
Unknown
CVE-2022-2873
Disclosure Date: August 22, 2022 (last updated February 24, 2025)
An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.
0
Attacker Value
Unknown
CVE-2022-1973
Disclosure Date: August 05, 2022 (last updated February 24, 2025)
A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.
0
Attacker Value
Unknown
CVE-2022-37434
Disclosure Date: August 05, 2022 (last updated February 24, 2025)
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
0