Show filters
268 Total Results
Displaying 181-190 of 268
Sort by:
Attacker Value
Unknown

CVE-2021-45469

Disclosure Date: December 23, 2021 (last updated February 23, 2025)
In __f2fs_setxattr in fs/f2fs/xattr.c in the Linux kernel through 5.15.11, there is an out-of-bounds memory access when an inode has an invalid last xattr entry.
Attacker Value
Unknown

CVE-2021-44733

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.
Attacker Value
Unknown

CVE-2021-45100

Disclosure Date: December 16, 2021 (last updated February 23, 2025)
The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption.
Attacker Value
Unknown

CVE-2021-4044

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return value is mishandled by OpenSSL and will cause an IO function (such as SSL_connect() or SSL_do_handshake()) to not indicate success and a subsequent call to SSL_get_error() to return the value SSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be returned by OpenSSL if the application has previously called SSL_CTX_set_cert_verify_callback(). Since most applications do not do this the SSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be totally unexpected and applications may not behave correctly as a result. The exact behaviour will depend on the application but it could result in crashes, infinite loops or other similar incorrect responses. This issue is made more serious in combination with a separate bug …
Attacker Value
Unknown

CVE-2018-25020

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.
Attacker Value
Unknown

CVE-2021-43976

Disclosure Date: November 17, 2021 (last updated October 07, 2023)
In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).
Attacker Value
Unknown

CVE-2021-43975

Disclosure Date: November 17, 2021 (last updated February 23, 2025)
In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.
Attacker Value
Unknown

CVE-2021-42377

Disclosure Date: November 15, 2021 (last updated February 23, 2025)
An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.
Attacker Value
Unknown

CVE-2021-42376

Disclosure Date: November 15, 2021 (last updated February 23, 2025)
A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.
Attacker Value
Unknown

CVE-2021-42375

Disclosure Date: November 15, 2021 (last updated February 23, 2025)
An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.