Vulnerabilities > Linux > Linux Kernel > 5.6.4
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-02-14 | CVE-2021-44879 | NULL Pointer Dereference vulnerability in Linux Kernel In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference. | 5.5 |
2022-02-11 | CVE-2022-0185 | Integer Underflow (Wrap or Wraparound) vulnerability in multiple products A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. | 8.4 |
2022-02-11 | CVE-2022-0382 | Missing Initialization of Resource vulnerability in Linux Kernel An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. | 5.5 |
2022-02-11 | CVE-2022-24958 | Release of Invalid Pointer or Reference vulnerability in multiple products drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release. | 7.8 |
2022-02-04 | CVE-2021-4154 | Use After Free vulnerability in multiple products A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. | 8.8 |
2022-02-04 | CVE-2022-0264 | Improper Handling of Exceptional Conditions vulnerability in Linux Kernel A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. | 5.5 |
2022-02-04 | CVE-2022-24448 | Use of Uninitialized Resource vulnerability in multiple products An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. | 3.3 |
2022-01-26 | CVE-2021-22600 | Double Free vulnerability in multiple products A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. | 7.0 |
2022-01-21 | CVE-2021-4001 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Linux Kernel A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. | 4.1 |
2022-01-18 | CVE-2021-4083 | Race Condition vulnerability in multiple products A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. | 7.0 |