Total
5611 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-1198 | 2 Linux, Redhat | 2 Linux Kernel, Enterprise Linux | 2024-11-21 | N/A | 5.5 MEDIUM |
A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space. | |||||
CVE-2022-1195 | 2 Debian, Linux | 2 Debian Linux, Linux Kernel | 2024-11-21 | 2.1 LOW | 5.5 MEDIUM |
A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early. | |||||
CVE-2022-1184 | 4 Canonical, Debian, Linux and 1 more | 4 Ubuntu Linux, Debian Linux, Linux Kernel and 1 more | 2024-11-21 | N/A | 5.5 MEDIUM |
A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel’s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service. | |||||
CVE-2022-1158 | 3 Fedoraproject, Linux, Redhat | 3 Fedora, Linux Kernel, Enterprise Linux | 2024-11-21 | N/A | 7.8 HIGH |
A flaw was found in KVM. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition. | |||||
CVE-2022-1154 | 4 Debian, Fedoraproject, Oracle and 1 more | 4 Debian Linux, Fedora, Communications Cloud Native Core Network Exposure Function and 1 more | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646. | |||||
CVE-2022-1145 | 1 Google | 1 Chrome | 2024-11-21 | N/A | 7.5 HIGH |
Use after free in Extensions in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific user interaction and profile destruction. | |||||
CVE-2022-1144 | 1 Google | 1 Chrome | 2024-11-21 | N/A | 8.8 HIGH |
Use after free in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools. | |||||
CVE-2022-1141 | 1 Google | 1 Chrome | 2024-11-21 | N/A | 8.8 HIGH |
Use after free in File Manager in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user gesture. | |||||
CVE-2022-1136 | 1 Google | 1 Chrome | 2024-11-21 | N/A | 8.8 HIGH |
Use after free in Tab Strip in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific set of user gestures. | |||||
CVE-2022-1135 | 1 Google | 1 Chrome | 2024-11-21 | N/A | 8.8 HIGH |
Use after free in Shopping Cart in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via standard feature user interaction. | |||||
CVE-2022-1133 | 1 Google | 1 Chrome | 2024-11-21 | N/A | 8.8 HIGH |
Use after free in WebRTC Perf in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | |||||
CVE-2022-1131 | 1 Google | 1 Chrome | 2024-11-21 | N/A | 8.8 HIGH |
Use after free in Cast UI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | |||||
CVE-2022-1127 | 1 Google | 1 Chrome | 2024-11-21 | N/A | 8.8 HIGH |
Use after free in QR Code Generator in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction. | |||||
CVE-2022-1125 | 1 Google | 1 Chrome | 2024-11-21 | N/A | 8.8 HIGH |
Use after free in Portals in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction. | |||||
CVE-2022-1114 | 1 Imagemagick | 1 Imagemagick | 2024-11-21 | 5.8 MEDIUM | 7.1 HIGH |
A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service. | |||||
CVE-2022-1106 | 1 Mruby | 1 Mruby | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2. | |||||
CVE-2022-1071 | 1 Mruby | 1 Mruby | 2024-11-21 | 6.8 MEDIUM | 8.2 HIGH |
User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2. | |||||
CVE-2022-1055 | 5 Canonical, Fedoraproject, Linux and 2 more | 20 Ubuntu Linux, Fedora, Linux Kernel and 17 more | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 | |||||
CVE-2022-1050 | 1 Qemu | 1 Qemu | 2024-11-21 | 4.6 MEDIUM | 8.8 HIGH |
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to execute HW commands when shared buffers are not yet allocated, potentially leading to a use-after-free condition. | |||||
CVE-2022-1048 | 4 Debian, Linux, Netapp and 1 more | 19 Debian Linux, Linux Kernel, H300e and 16 more | 2024-11-21 | 6.9 MEDIUM | 7.0 HIGH |
A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system. |