Show filters
4,242 Total Results
Displaying 201-210 of 4,242
Sort by:
Attacker Value
Unknown

CVE-2021-32547

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-lts package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32551

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32553

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32549

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-13 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2020-15078

Disclosure Date: April 26, 2021 (last updated February 22, 2025)
OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
Attacker Value
Unknown

CVE-2021-3492

Disclosure Date: April 15, 2021 (last updated February 22, 2025)
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (kernel memory exhaustion) or gain privileges via executing arbitrary code. AKA ZDI-CAN-13562.
Attacker Value
Unknown

CVE-2021-3444

Disclosure Date: March 23, 2021 (last updated February 22, 2025)
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
Attacker Value
Unknown

CVE-2020-27171

Disclosure Date: March 20, 2021 (last updated February 22, 2025)
An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.
Attacker Value
Unknown

CVE-2020-27170

Disclosure Date: March 20, 2021 (last updated February 22, 2025)
An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.
Attacker Value
Unknown

CVE-2021-27364

Disclosure Date: March 07, 2021 (last updated February 22, 2025)
An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.