Show filters
1,908 Total Results
Displaying 41-50 of 1,908
Sort by:
Attacker Value
Unknown
CVE-2024-1394
Disclosure Date: March 21, 2024 (last updated February 26, 2025)
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
0
Attacker Value
Unknown
CVE-2021-3600
Disclosure Date: January 08, 2024 (last updated February 25, 2025)
It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
0
Attacker Value
Unknown
CVE-2022-3328
Disclosure Date: January 08, 2024 (last updated February 25, 2025)
Race condition in snap-confine's must_mkdir_and_open_with_perms()
0
Attacker Value
Unknown
CVE-2022-2602
Disclosure Date: January 08, 2024 (last updated February 25, 2025)
io_uring UAF, Unix SCM garbage collection
0
Attacker Value
Unknown
CVE-2022-2588
Disclosure Date: January 08, 2024 (last updated February 25, 2025)
It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.
0
Attacker Value
Unknown
CVE-2022-2586
Disclosure Date: January 08, 2024 (last updated February 25, 2025)
It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.
0
Attacker Value
Unknown
CVE-2023-45866
Disclosure Date: December 08, 2023 (last updated February 25, 2025)
Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.
0
Attacker Value
Unknown
CVE-2023-3777
Disclosure Date: September 06, 2023 (last updated February 25, 2025)
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.
We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.
0
Attacker Value
Unknown
CVE-2023-1523
Disclosure Date: September 01, 2023 (last updated February 25, 2025)
Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
0
Attacker Value
Unknown
CVE-2023-40283
Disclosure Date: August 14, 2023 (last updated February 25, 2025)
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
0