Page 695 of 4082 results (0.036 seconds)

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 0

A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak. Se encontró una vulnerabilidad de uso de memoria previamente liberada en la función drm_lease_held en el archivo drivers/gpu/drm/drm_lease.c en el kernel de Linux debido a un problema de carrera. Este fallo permite a un atacante con privilegios de usuario local causar una denegación de servicio (DoS) o un filtrado de información del kernel • https://bugzilla.redhat.com/show_bug.cgi?id=2071022 https://www.openwall.com/lists/oss-security/2022/04/12/3 https://access.redhat.com/security/cve/CVE-2022-1280 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release. El archivo drivers/infiniband/ulp/rtrs/rtrs-clt.c en el kernel de Linux versiones anteriores a 5.16.12, presenta una doble liberación relacionado con rtrs_clt_dev_release • https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12 https://github.com/torvalds/linux/commit/8700af2cc18c919b2a83e74e0479038fd113c15d https://security.netapp.com/advisory/ntap-20220602-0002 • CWE-415: Double Free •

CVSS: 7.8EPSS: 0%CPEs: 26EXPL: 0

The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state. El subsistema SUNRPC en el kernel de Linux versiones hasta 5.17.2, puede llamar a xs_xprt_free antes de asegurarse de que los sockets están en el estado deseado A use-after-free flaw was found in the Linux kernel’s net/sunrpc/xprt.c function in the Remote Procedure Call (SunRPC) protocol. This flaw allows a local attacker to crash the system, leading to a kernel information leak issue. • http://www.openwall.com/lists/oss-security/2022/04/11/3 http://www.openwall.com/lists/oss-security/2022/04/11/4 http://www.openwall.com/lists/oss-security/2022/04/11/5 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a https://security.netapp.com/advisory/ntap-20220526-0002 https://www.debian.org/security/2022/dsa-5161 https://access.redhat.com/security/cve/CVE-2022-28893 https://bugzilla.redhat.com/s • CWE-416: Use After Free •

CVSS: 7.0EPSS: 0%CPEs: 25EXPL: 0

jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition. La función jbd2_journal_wait_updates en el archivo fs/jbd2/transaction.c en el kernel de Linux versiones anteriores a 5.17.1, presenta un uso de memoria previamente liberada causado por una condición de carrera transaction_t • https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1 https://github.com/torvalds/linux/commit/cc16eecae687912238ee6efbff71ad31e2bc414e https://security.netapp.com/advisory/ntap-20220506-0006 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.5EPSS: 0%CPEs: 22EXPL: 0

usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free. La función usb_8dev_start_xmit en el archivo drivers/net/can/usb/usb_8dev.c en el kernel de Linux versiones hasta 5.17.1, presenta una doble liberación A double-free flaw was found in the Linux kernel's USB2CAN interface implementation. This issue could allow a local user to crash the system. • https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT https://security.netapp.com/advisory/ntap-20220513-0001 https://www.debian.org/security/2022/dsa-512 • CWE-415: Double Free •