Show filters
268 Total Results
Displaying 151-160 of 268
Sort by:
Attacker Value
Unknown

CVE-2022-0635

Disclosure Date: March 16, 2022 (last updated February 23, 2025)
Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.
Attacker Value
Unknown

CVE-2022-0396

Disclosure Date: March 16, 2022 (last updated February 23, 2025)
BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
Attacker Value
Unknown

CVE-2021-25220

Disclosure Date: March 16, 2022 (last updated February 23, 2025)
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.
0
Attacker Value
Unknown

CVE-2022-27223

Disclosure Date: March 16, 2022 (last updated February 23, 2025)
In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.
Attacker Value
Unknown

CVE-2022-26966

Disclosure Date: March 12, 2022 (last updated October 07, 2023)
An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.
Attacker Value
Unknown

CVE-2022-0516

Disclosure Date: March 10, 2022 (last updated February 23, 2025)
A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.
Attacker Value
Unknown

CVE-2021-3739

Disclosure Date: March 10, 2022 (last updated February 23, 2025)
A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires ‘CAP_SYS_ADMIN’. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2022-26490

Disclosure Date: March 06, 2022 (last updated February 23, 2025)
st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.
Attacker Value
Unknown

CVE-2021-3743

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2021-3640

Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.