Page 407 of 4855 results (0.029 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

05 Jul 2022 — network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed. El backend de la red puede hacer que Linux netfront use SKB liberados Al agregar lógica para admitir XDP (ruta de datos eXpress), se movió una etiqueta de código de una manera que permitía que los SKB tuvieran referencias (punteros) retenidas para un procesamie... • http://www.openwall.com/lists/oss-security/2022/07/05/5 • CWE-459: Incomplete Cleanup •

CVSS: 4.7EPSS: 0%CPEs: 3EXPL: 0

05 Jul 2022 — Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' me... • http://www.openwall.com/lists/oss-security/2022/07/05/4 •

CVSS: 7.8EPSS: 0%CPEs: 22EXPL: 9

04 Jul 2022 — An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c. Se ha detectado un problema en el kernel de Linux versiones hasta 5.18.9. • https://github.com/veritas501/CVE-2022-34918 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') CWE-1025: Comparison Using Wrong Factors •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 1

30 Jun 2022 — A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code. Se ha encontrado una vulnerabilidad en la función nft_set_desc_concat_parse() del kernel de Linux. Este fallo permite a un atacante desencadenar un desbordamiento de búfer por medio de la función nft_set_desc_concat_parse() , causando una denegación de servicio y posiblemente una... • https://github.com/delsploit/CVE-2022-2078 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-121: Stack-based Buffer Overflow •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

28 Jun 2022 — A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU. Se ha encontrado un fallo de desreferencia de puntero NULL en el módulo KVM del kernel de Linux, que puede conllevar a una denegación de servicio en el archivo x86_emulate_insn en arch/x86/kvm/emulate.c. Este fallo es producido mientras es ejecutada una instrucció... • https://bugzilla.redhat.com/show_bug.cgi?id=2089815 • CWE-476: NULL Pointer Dereference •

CVSS: 4.1EPSS: 0%CPEs: 1EXPL: 0

28 Jun 2022 — A use-after-free flaw was found in the Linux kernel's NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information. Se ha encontrado un fallo de uso de memoria previamente liberada en la funcionalidad del núcleo NFC del kernel de Linux debido a una condición de carrera entre la creación y el borrado de kobject. Esta vulnerabilidad permite a un atacante local con privilegios CAP_NET_ADMIN... • https://github.com/torvalds/linux/commit/da5c0f119203ad9728920456a0f52a6d850c01cd • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition CWE-416: Use After Free •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

28 Jun 2022 — There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space. Se presenta un fallo de sleep-in-atomic en /net/nfc/netlink.c que permite a un atacante bloquear el kernel de Linux al simular un dispositivo nfc desde el espacio de usuario • https://github.com/torvalds/linux/commit/4071bf121d59944d5cd2238de0642f3d7995a997 • CWE-248: Uncaught Exception •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

26 Jun 2022 — rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free. La función rpmsg_virtio_add_ctrl_dev en el archivo drivers/rpmsg/virtio_rpmsg_bus.c en el kernel de Linux versiones anteriores a 5.18.4, presenta una doble liberación • https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4 • CWE-415: Double Free •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

26 Jun 2022 — rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free. La función rpmsg_probe en el archivo drivers/rpmsg/virtio_rpmsg_bus.c en el kernel de Linux versiones anteriores a 5.18.4, presenta una doble liberación • https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4 • CWE-415: Double Free •

CVSS: 7.4EPSS: 0%CPEs: 14EXPL: 0

22 Jun 2022 — A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc. Se ha encontrado una condición de carrera en el kernel de Linux en la función perf_event_open() que puede ser explotada por un usuario no privilegiado para conseguir privilegios de root. El bug permite construir varias primitivas de explotación como un filt... • https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-366: Race Condition within a Thread •