Vulnerabilities > Linux > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-05-26 | CVE-2020-25671 | A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations. | 7.8 |
2021-05-26 | CVE-2021-22543 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. | 7.8 |
2021-05-25 | CVE-2020-25672 | A memory leak vulnerability was found in Linux kernel in llcp_sock_connect | 7.5 |
2021-05-21 | CVE-2021-31440 | This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.11.15. | 7.0 |
2021-05-18 | CVE-2002-2438 | Unspecified vulnerability in Linux Kernel TCP firewalls could be circumvented by sending a SYN Packets with other flags (like e.g. | 7.5 |
2021-05-17 | CVE-2021-3483 | A flaw was found in the Nosy driver in the Linux kernel. | 7.8 |
2021-05-14 | CVE-2019-25044 | Use After Free vulnerability in multiple products The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. | 7.8 |
2021-05-14 | CVE-2021-33033 | Use After Free vulnerability in Linux Kernel The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. | 7.8 |
2021-05-14 | CVE-2021-33034 | Use After Free vulnerability in multiple products In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. | 7.8 |
2021-05-11 | CVE-2021-32606 | Use After Free vulnerability in multiple products In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. | 7.8 |