Show filters
310 Total Results
Displaying 111-120 of 310
Sort by:
Attacker Value
Unknown

CVE-2022-39046

Disclosure Date: August 31, 2022 (last updated February 24, 2025)
An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the heap.
Attacker Value
Unknown

CVE-2022-2961

Disclosure Date: August 29, 2022 (last updated February 24, 2025)
A use-after-free flaw was found in the Linux kernel’s PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Attacker Value
Unknown

CVE-2022-1199

Disclosure Date: August 29, 2022 (last updated February 24, 2025)
A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.
Attacker Value
Unknown

CVE-2021-4204

Disclosure Date: August 24, 2022 (last updated February 24, 2025)
An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.
Attacker Value
Unknown

CVE-2021-3998

Disclosure Date: August 24, 2022 (last updated February 24, 2025)
A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.
Attacker Value
Unknown

CVE-2021-3999

Disclosure Date: August 24, 2022 (last updated February 24, 2025)
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
Attacker Value
Unknown

CVE-2022-2938

Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.
Attacker Value
Unknown

CVE-2022-2873

Disclosure Date: August 22, 2022 (last updated February 24, 2025)
An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.
Attacker Value
Unknown

CVE-2022-1973

Disclosure Date: August 05, 2022 (last updated February 24, 2025)
A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.
Attacker Value
Unknown

CVE-2022-37434

Disclosure Date: August 05, 2022 (last updated February 24, 2025)
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).