Show filters
4,186 Total Results
Displaying 81-90 of 4,186
Sort by:
Attacker Value
Unknown
CVE-2023-1523
Disclosure Date: September 01, 2023 (last updated October 08, 2023)
Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
0
Attacker Value
Unknown
CVE-2023-40283
Disclosure Date: August 14, 2023 (last updated August 27, 2024)
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
0
Attacker Value
Unknown
CVE-2023-32629
Disclosure Date: July 26, 2023 (last updated October 08, 2023)
Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels
0
Attacker Value
Unknown
CVE-2023-3567
Disclosure Date: July 24, 2023 (last updated May 22, 2024)
A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.
0
Attacker Value
Unknown
CVE-2023-31248
Disclosure Date: July 05, 2023 (last updated December 13, 2023)
Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace
0
Attacker Value
Unknown
CVE-2023-3389
Disclosure Date: June 28, 2023 (last updated February 14, 2025)
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.
Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.
We recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).
0
Attacker Value
Unknown
CVE-2023-35788
Disclosure Date: June 16, 2023 (last updated June 27, 2024)
An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.
0
Attacker Value
Unknown
CVE-2023-2612
Disclosure Date: May 31, 2023 (last updated October 08, 2023)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock).
0
Attacker Value
Unknown
CVE-2023-1786
Disclosure Date: April 26, 2023 (last updated October 08, 2023)
Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.
0
Attacker Value
Unknown
CVE-2022-2084
Disclosure Date: April 19, 2023 (last updated October 08, 2023)
Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.
0