CVE-2022-1852 – kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS
https://notcve.org/view.php?id=CVE-2022-1852
28 Jun 2022 — A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU. Se ha encontrado un fallo de desreferencia de puntero NULL en el módulo KVM del kernel de Linux, que puede conllevar a una denegación de servicio en el archivo x86_emulate_insn en arch/x86/kvm/emulate.c. Este fallo es producido mientras es ejecutada una instrucció... • https://bugzilla.redhat.com/show_bug.cgi?id=2089815 • CWE-476: NULL Pointer Dereference •
CVE-2022-1974 – Ubuntu Security Notice USN-6014-1
https://notcve.org/view.php?id=CVE-2022-1974
28 Jun 2022 — A use-after-free flaw was found in the Linux kernel's NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information. Se ha encontrado un fallo de uso de memoria previamente liberada en la funcionalidad del núcleo NFC del kernel de Linux debido a una condición de carrera entre la creación y el borrado de kobject. Esta vulnerabilidad permite a un atacante local con privilegios CAP_NET_ADMIN... • https://github.com/torvalds/linux/commit/da5c0f119203ad9728920456a0f52a6d850c01cd • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition CWE-416: Use After Free •
CVE-2022-1975 – Ubuntu Security Notice USN-6014-1
https://notcve.org/view.php?id=CVE-2022-1975
28 Jun 2022 — There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space. Se presenta un fallo de sleep-in-atomic en /net/nfc/netlink.c que permite a un atacante bloquear el kernel de Linux al simular un dispositivo nfc desde el espacio de usuario Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A l... • https://github.com/torvalds/linux/commit/4071bf121d59944d5cd2238de0642f3d7995a997 • CWE-248: Uncaught Exception •
CVE-2022-34494 – Ubuntu Security Notice USN-5644-1
https://notcve.org/view.php?id=CVE-2022-34494
26 Jun 2022 — rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free. La función rpmsg_virtio_add_ctrl_dev en el archivo drivers/rpmsg/virtio_rpmsg_bus.c en el kernel de Linux versiones anteriores a 5.18.4, presenta una doble liberación It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or po... • https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4 • CWE-415: Double Free •
CVE-2022-34495 – Ubuntu Security Notice USN-5683-1
https://notcve.org/view.php?id=CVE-2022-34495
26 Jun 2022 — rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free. La función rpmsg_probe en el archivo drivers/rpmsg/virtio_rpmsg_bus.c en el kernel de Linux versiones anteriores a 5.18.4, presenta una doble liberación It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary cod... • https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4 • CWE-415: Double Free •
CVE-2022-1729 – kernel: race condition in perf_event_open leads to privilege escalation
https://notcve.org/view.php?id=CVE-2022-1729
22 Jun 2022 — A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc. Se ha encontrado una condición de carrera en el kernel de Linux en la función perf_event_open() que puede ser explotada por un usuario no privilegiado para conseguir privilegios de root. El bug permite construir varias primitivas de explotación como un filt... • https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-366: Race Condition within a Thread •
CVE-2022-33981 – Ubuntu Security Notice USN-5518-1
https://notcve.org/view.php?id=CVE-2022-33981
18 Jun 2022 — drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function. El archivo drivers/block/floppy.c en el kernel de Linux versiones anteriores a 5.17.6, es vulnerable a una denegación de servicio, debido a un fallo de uso de concurrencia después de la asignación de raw_cmd en la función raw_cmd_ioctl Zhenpeng Lin discovered that the network packet scheduler implementation in th... • https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6 • CWE-416: Use After Free •
CVE-2022-32981
https://notcve.org/view.php?id=CVE-2022-32981
10 Jun 2022 — An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers. Se ha detectado un problema en el kernel de Linux versiones hasta 5.18.3, en plataformas powerpc de 32 bits. Se presenta un desbordamiento de búfer en ptrace PEEKUSER y POKEUSER (también conocidos como PEEKUSR y POKEUSR) cuando es accedido a los registros de punto flotante • https://github.com/SpiralBL0CK/CVE-2022-32981 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-1998 – kernel: fanotify misuses fd_install() which could lead to use-after-free
https://notcve.org/view.php?id=CVE-2022-1998
09 Jun 2022 — A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system. Se ha encontrado un uso de memoria previamente liberada en la funcionalidad de notificación del sistema de archivos del kernel de Linux en la forma en que el usuario activa la llamada copy_info_records_to_user() para fallar en copy_... • https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d • CWE-416: Use After Free •
CVE-2022-1263 – kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c
https://notcve.org/view.php?id=CVE-2022-1263
08 Jun 2022 — A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service. Se encontró un problema de desreferencia de puntero NULL en KVM cuando es liberada una vCPU con el soporte de anillo sucio habilitado. Este fallo permite a un atacante local no privilegiado en el host emitir llamadas ioctl específicas, causando un... • https://access.redhat.com/security/cve/CVE-2022-1263 • CWE-476: NULL Pointer Dereference •