Show filters
267 Total Results
Displaying 51-60 of 267
Sort by:
Attacker Value
Unknown

CVE-2022-47520

Disclosure Date: December 18, 2022 (last updated October 08, 2023)
An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.
Attacker Value
Unknown

CVE-2022-47519

Disclosure Date: December 18, 2022 (last updated October 08, 2023)
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.
Attacker Value
Unknown

CVE-2022-47518

Disclosure Date: December 18, 2022 (last updated October 08, 2023)
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.
Attacker Value
Unknown

CVE-2022-35260

Disclosure Date: December 05, 2022 (last updated March 28, 2024)
curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.
Attacker Value
Unknown

CVE-2022-32221

Disclosure Date: December 05, 2022 (last updated March 28, 2024)
When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.
Attacker Value
Unknown

CVE-2022-45934

Disclosure Date: November 27, 2022 (last updated October 08, 2023)
An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.
Attacker Value
Unknown

CVE-2022-45919

Disclosure Date: November 27, 2022 (last updated January 13, 2024)
An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.
Attacker Value
Unknown

CVE-2022-45888

Disclosure Date: November 25, 2022 (last updated October 08, 2023)
An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.
Attacker Value
Unknown

CVE-2022-45887

Disclosure Date: November 25, 2022 (last updated October 08, 2023)
An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.
Attacker Value
Unknown

CVE-2022-45886

Disclosure Date: November 25, 2022 (last updated December 05, 2023)
An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.