Vulnerabilities > Linux
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-07-02 | CVE-2021-36144 | Use After Free vulnerability in Linux Acrn The polling timer handler in ACRN before 2.5 has a use-after-free for a freed virtio device, related to devicemodel/hw/pci/virtio/*.c. | 7.5 |
2021-07-02 | CVE-2021-36145 | Use After Free vulnerability in Linux Acrn The Device Model in ACRN through 2.5 has a devicemodel/core/mem.c use-after-free for a freed rb_entry. | 7.5 |
2021-07-02 | CVE-2021-36146 | NULL Pointer Dereference vulnerability in Linux Acrn ACRN before 2.5 has a devicemodel/hw/pci/xhci.c NULL Pointer Dereference for a trb pointer. | 7.5 |
2021-07-02 | CVE-2021-36147 | NULL Pointer Dereference vulnerability in Linux Acrn An issue was discovered in ACRN before 2.5. | 7.5 |
2021-07-02 | CVE-2021-36148 | Classic Buffer Overflow vulnerability in Linux Acrn An issue was discovered in ACRN before 2.5. | 7.8 |
2021-06-29 | CVE-2021-28691 | Use After Free vulnerability in multiple products Guest triggered use-after-free in Linux xen-netback A malicious or buggy network PV frontend can force Linux netback to disable the interface and terminate the receive kernel thread associated with queue 0 in response to the frontend sending a malformed packet. | 7.8 |
2021-06-24 | CVE-2020-28097 | Out-of-bounds Read vulnerability in multiple products The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. | 5.9 |
2021-06-23 | CVE-2021-33624 | Type Confusion vulnerability in multiple products In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db. | 4.7 |
2021-06-22 | CVE-2010-2525 | Unspecified vulnerability in Linux Kernel 2.6.33 A flaw was discovered in gfs2 file system’s handling of acls (access control lists). | 7.8 |
2021-06-17 | CVE-2021-32078 | Out-of-bounds Read vulnerability in Linux Kernel An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4. | 7.1 |