Show filters
266 Total Results
Displaying 141-150 of 266
Sort by:
Attacker Value
Unknown

CVE-2021-4203

Disclosure Date: March 25, 2022 (last updated February 23, 2025)
A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.
Attacker Value
Unknown

CVE-2018-25032

Disclosure Date: March 25, 2022 (last updated February 23, 2025)
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
Attacker Value
Unknown

CVE-2021-4197

Disclosure Date: March 23, 2022 (last updated February 23, 2025)
An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.
Attacker Value
Unknown

CVE-2022-27666

Disclosure Date: March 23, 2022 (last updated February 23, 2025)
A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.
Attacker Value
Unknown

CVE-2022-1011

Disclosure Date: March 18, 2022 (last updated February 23, 2025)
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.
Attacker Value
Unknown

CVE-2022-0742

Disclosure Date: March 18, 2022 (last updated February 23, 2025)
Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.
Attacker Value
Unknown

CVE-2021-45868

Disclosure Date: March 18, 2022 (last updated February 23, 2025)
In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.
Attacker Value
Unknown

CVE-2022-0667

Disclosure Date: March 16, 2022 (last updated February 23, 2025)
When the vulnerability is triggered the BIND process will exit. BIND 9.18.0
Attacker Value
Unknown

CVE-2022-0635

Disclosure Date: March 16, 2022 (last updated February 23, 2025)
Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.
Attacker Value
Unknown

CVE-2022-0396

Disclosure Date: March 16, 2022 (last updated February 23, 2025)
BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.