Show filters
310 Total Results
Displaying 181-190 of 310
Sort by:
Attacker Value
Unknown
CVE-2022-27666
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.
0
Attacker Value
Unknown
CVE-2022-1011
Disclosure Date: March 18, 2022 (last updated February 23, 2025)
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.
0
Attacker Value
Unknown
CVE-2022-0742
Disclosure Date: March 18, 2022 (last updated February 23, 2025)
Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.
0
Attacker Value
Unknown
CVE-2021-45868
Disclosure Date: March 18, 2022 (last updated February 23, 2025)
In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.
0
Attacker Value
Unknown
CVE-2022-0667
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
When the vulnerability is triggered the BIND process will exit. BIND 9.18.0
0
Attacker Value
Unknown
CVE-2022-0635
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.
0
Attacker Value
Unknown
CVE-2022-0396
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
0
Attacker Value
Unknown
CVE-2021-25220
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.
0
Attacker Value
Unknown
CVE-2022-27223
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.
0
Attacker Value
Unknown
CVE-2022-26966
Disclosure Date: March 12, 2022 (last updated October 07, 2023)
An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.
0