Vulnerabilities > Linux > Linux Kernel > 2.6.32.26
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-03-23 | CVE-2021-3444 | Incorrect Conversion between Numeric Types vulnerability in multiple products The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. | 4.6 |
2021-03-11 | CVE-2021-20261 | Race Condition vulnerability in multiple products A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. | 4.4 |
2021-03-09 | CVE-2021-3411 | Code Injection vulnerability in multiple products A flaw was found in the Linux kernel in versions prior to 5.10. | 4.6 |
2021-03-09 | CVE-2021-20268 | Integer Overflow or Wraparound vulnerability in Linux Kernel An out-of-bounds access flaw was found in the Linux kernel's implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. | 7.8 |
2021-03-07 | CVE-2021-27365 | Out-of-bounds Write vulnerability in multiple products An issue was discovered in the Linux kernel through 5.11.3. | 4.6 |
2021-03-07 | CVE-2021-27364 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in the Linux kernel through 5.11.3. | 3.6 |
2021-03-07 | CVE-2021-27363 | An issue was discovered in the Linux kernel through 5.11.3. | 3.6 |
2021-03-04 | CVE-2020-25639 | NULL Pointer Dereference vulnerability in multiple products A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. | 4.4 |
2021-02-10 | CVE-2020-16120 | Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. | 2.1 |
2021-02-01 | CVE-2021-3348 | Use After Free vulnerability in multiple products nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71. | 4.4 |