Show filters
156 Total Results
Displaying 41-50 of 156
Sort by:
Attacker Value
Unknown
CVE-2021-33574
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.
0
Attacker Value
Unknown
CVE-2020-25672
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
A memory leak vulnerability was found in Linux kernel in llcp_sock_connect
0
Attacker Value
Unknown
CVE-2021-31440
Disclosure Date: May 21, 2021 (last updated February 22, 2025)
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.11.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-13661.
0
Attacker Value
Unknown
CVE-2021-22543
Disclosure Date: May 18, 2021 (last updated February 22, 2025)
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.
0
Attacker Value
Unknown
CVE-2019-25044
Disclosure Date: May 14, 2021 (last updated February 22, 2025)
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
0
Attacker Value
Unknown
CVE-2021-32399
Disclosure Date: May 10, 2021 (last updated February 22, 2025)
net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.
0
Attacker Value
Unknown
CVE-2020-35519
Disclosure Date: May 06, 2021 (last updated February 22, 2025)
An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
0
Attacker Value
Unknown
CVE-2021-3501
Disclosure Date: May 06, 2021 (last updated February 22, 2025)
A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat from this vulnerability is to data integrity and system availability.
0
Attacker Value
Unknown
CVE-2021-3506
Disclosure Date: April 19, 2021 (last updated February 22, 2025)
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2021-23133
Disclosure Date: April 13, 2021 (last updated February 22, 2025)
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.
0