Show filters
148 Total Results
Displaying 31-40 of 148
Sort by:
Attacker Value
Unknown

CVE-2021-4157

Disclosure Date: March 25, 2022 (last updated October 07, 2023)
An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.
Attacker Value
Unknown

CVE-2022-27666

Disclosure Date: March 23, 2022 (last updated October 07, 2023)
A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.
Attacker Value
Unknown

CVE-2022-1011

Disclosure Date: March 18, 2022 (last updated October 07, 2023)
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.
Attacker Value
Unknown

CVE-2022-0742

Disclosure Date: March 18, 2022 (last updated October 07, 2023)
Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.
Attacker Value
Unknown

CVE-2021-45868

Disclosure Date: March 18, 2022 (last updated October 07, 2023)
In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.
Attacker Value
Unknown

CVE-2022-0667

Disclosure Date: March 16, 2022 (last updated November 10, 2023)
When the vulnerability is triggered the BIND process will exit. BIND 9.18.0
Attacker Value
Unknown

CVE-2022-0635

Disclosure Date: March 16, 2022 (last updated November 10, 2023)
Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.
Attacker Value
Unknown

CVE-2022-0396

Disclosure Date: March 16, 2022 (last updated November 10, 2023)
BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
Attacker Value
Unknown

CVE-2021-25220

Disclosure Date: March 16, 2022 (last updated November 29, 2024)
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.
0
Attacker Value
Unknown

CVE-2022-27223

Disclosure Date: March 16, 2022 (last updated February 09, 2024)
In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.