This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Linux First view 1995-09-07
Product Linux Kernel Last view 2022-05-05
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:linux:linux_kernel:2.6.0:-:*:*:*:*:*:* 2160
cpe:2.3:o:linux:linux_kernel:2.6.1:-:*:*:*:*:*:* 2137
cpe:2.3:o:linux:linux_kernel:2.6.2:-:*:*:*:*:*:* 2131
cpe:2.3:o:linux:linux_kernel:2.6.3:-:*:*:*:*:*:* 2128
cpe:2.3:o:linux:linux_kernel:2.6.5:-:*:*:*:*:*:* 2127
cpe:2.3:o:linux:linux_kernel:2.6.4:-:*:*:*:*:*:* 2127
cpe:2.3:o:linux:linux_kernel:2.6.6:-:*:*:*:*:*:* 2123
cpe:2.3:o:linux:linux_kernel:2.6.7:-:*:*:*:*:*:* 2122
cpe:2.3:o:linux:linux_kernel:2.6.10:-:*:*:*:*:*:* 2121
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:* 2118
cpe:2.3:o:linux:linux_kernel:2.6.11:-:*:*:*:*:*:* 2112
cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:* 2106
cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:* 2106
cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:* 2105
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:* 2102
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:* 2102
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:* 2100
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:* 2099
cpe:2.3:o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:* 2099
cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:* 2092
cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:* 2090
cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:* 2090
cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:* 2088
cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:* 2087
cpe:2.3:o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:* 2087
cpe:2.3:o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:* 2087
cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:* 2087
cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:* 2087
cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:* 2086
cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:* 2086
cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:* 2086
cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:* 2086
cpe:2.3:o:linux:linux_kernel:2.4.18:-:*:*:*:*:*:* 2086
cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:* 2086
cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:* 2086
cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:* 2086
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:* 2086
cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:* 2086
cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:* 2086

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.5 2022-05-05 CVE-2022-1516

A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.

6.7 2022-05-03 CVE-2022-20108

In voice service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330702; Issue ID: DTV03330702.

4.4 2022-05-03 CVE-2022-20107

In subtitle service, there is a possible application crash due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330673; Issue ID: DTV03330673.

6.7 2022-05-03 CVE-2022-20106

In MM service, there is a possible out of bounds write due to a heap-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.

6.7 2022-05-03 CVE-2022-20105

In MM service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.

7.8 2022-05-02 CVE-2022-29968

An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.

7.1 2022-04-29 CVE-2022-1353

A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.

5.5 2022-04-29 CVE-2022-1195

A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.

7 2022-04-29 CVE-2022-1048

A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.

6.6 2022-04-29 CVE-2022-1015

A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.

7 2022-04-22 CVE-2022-29582

In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.

5.5 2022-04-18 CVE-2011-4917

In the Linux kernel through 3.1 there is an information disclosure issue via /proc/stat.

7.8 2022-04-13 CVE-2022-29156

drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.

6.3 2022-04-13 CVE-2022-1280

A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.

7.8 2022-04-11 CVE-2022-28893

The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.

7 2022-04-08 CVE-2022-28796

jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.

7.8 2022-04-03 CVE-2022-28390

ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.

7.8 2022-04-03 CVE-2022-28389

mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.

7.8 2022-04-03 CVE-2022-28388

usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.

7.5 2022-04-02 CVE-2022-28356

In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.

7.8 2022-04-01 CVE-2021-3847

An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system.

7.8 2022-03-30 CVE-2022-0998

An integer overflow flaw was found in the Linux kernel’s virtio device driver code in the way a user triggers the vhost_vdpa_config_validate function. This flaw allows a local user to crash or potentially escalate their privileges on the system.

3.4 2022-03-30 CVE-2020-35501

A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem

7.8 2022-03-29 CVE-2022-1055

A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5

5.5 2022-03-28 CVE-2022-27950

In drivers/hid/hid-elo.c in the Linux kernel before 5.16.11, a memory leak exists for a certain hid_parse error condition.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
10% (245) CWE-200 Information Exposure
9% (211) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
8% (194) CWE-416 Use After Free
7% (172) CWE-476 NULL Pointer Dereference
7% (171) CWE-20 Improper Input Validation
7% (167) CWE-264 Permissions, Privileges, and Access Controls
6% (156) CWE-399 Resource Management Errors
6% (146) CWE-362 Race Condition
4% (112) CWE-787 Out-of-bounds Write
3% (78) CWE-125 Out-of-bounds Read
3% (75) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
2% (64) CWE-189 Numeric Errors
2% (60) CWE-190 Integer Overflow or Wraparound
2% (48) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (39) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
1% (36) CWE-284 Access Control (Authorization) Issues
1% (30) CWE-269 Improper Privilege Management
1% (23) CWE-415 Double Free
0% (13) CWE-772 Missing Release of Resource after Effective Lifetime
0% (13) CWE-310 Cryptographic Issues
0% (13) CWE-17 Code
0% (11) CWE-665 Improper Initialization
0% (11) CWE-369 Divide By Zero
0% (10) CWE-667 Insufficient Locking
0% (8) CWE-287 Improper Authentication

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-17 Accessing, Modifying or Executing Executable Files
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-28 Fuzzing
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-39 Manipulating Opaque Client-based Data Tokens
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-44 Overflow Binary Resource File
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-51 Poison Web Service Registry
CAPEC-52 Embedding NULL Bytes
CAPEC-53 Postfix, Null Terminate, and Backslash

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:2665 Data Leak in NIC
oval:org.mitre.oval:def:28706 Critical Patch Update January 2015
oval:org.mitre.oval:def:254 Linux Kernel ptrace Privilege Escalation Vulnerability
oval:org.mitre.oval:def:260 Netfilter Denial of Service
oval:org.mitre.oval:def:261 Linux Route Cache / Netfilter Denial of Service
oval:org.mitre.oval:def:278 Linux ioperm Privilege Restriction Vulnerability
oval:org.mitre.oval:def:309 Linux Kernel execve Race Condition Vulnerability
oval:org.mitre.oval:def:10285 The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer...
oval:org.mitre.oval:def:327 Linux Kernel execve Read Access to Restricted File Descriptors
oval:org.mitre.oval:def:328 Linux Kernel /proc/self setuid Vulnerability
oval:org.mitre.oval:def:386 Lunix Kernel NFSv3 Procedure Kernel Panic Vulnerability
oval:org.mitre.oval:def:9406 Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not prop...
oval:org.mitre.oval:def:859 Red Hat Kernel Real Time Clock Data Leakage
oval:org.mitre.oval:def:1013 Red Hat Enterprise 3 Kernel Real Time Clock Data Leakage
oval:org.mitre.oval:def:867 Red Hat Enterprise 3 Linux Kernel do_mremap Denial of Service Vulnerability
oval:org.mitre.oval:def:860 Red Hat Linux Kernel do_mremap Denial of Service Vulnerability
oval:org.mitre.oval:def:10189 The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and p...
oval:org.mitre.oval:def:9707 Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6....
oval:org.mitre.oval:def:9423 kmod in the Linux kernel does not set its uid, suid, gid, or sgid to 0, which...
oval:org.mitre.oval:def:868 Linux Kernel eflags Checking Privilege Escalation Vulnerability
oval:org.mitre.oval:def:10910 Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation f...
oval:org.mitre.oval:def:9204 Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gai...
oval:org.mitre.oval:def:834 Red Hat Kernel R128 DRI Limits Checking Vulnerability
oval:org.mitre.oval:def:1017 Red Hat Enterprise 3 Kernel R128 DRI Limits Checking Vulnerability
oval:org.mitre.oval:def:835 Red Hat Kernel ncp_lookup Function BO

SAINT Exploits

Description Link
Linux kernel ptrace privilege elevation vulnerability More info here
Linux kernel __sock_diag_rcv_msg Netlink message privilege elevation More info here
Ubuntu overlayfs privilege elevation More info here
Linux kernel futex_requeue privilege elevation More info here
Linux Dirty COW Local File Overwrite More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
78509 Linux Kernel /proc/<pid>/mem Access Restriction Weakness Local Privileg...
78303 Linux Kernel sctp_rcv() / sctp_accept() Socket Lock Race Remote DoS
78302 Linux Kernel m_stop() Implementation Local DoS
78301 Linux Kernel NSF O_Direct Implementation Local DoS
78264 Linux Kernel KVM syscall Instruction Executable Handling Local DoS
78226 Linux Kernel fs/xfs/xfs_acl.c xfs_acl_from_disk() Function Memory Corruption
78225 Linux Kernel net/ipv4/igmp.c igmp_heard_query() Function IGMP Query Parsing R...
78014 Linux Kernel SG_IO SCSI IOCTL Command Parsing Local Privilege Escalation
77780 Linux Kernel B.A.T.M.A.N. net/batman/icmp_socket.c bat_socket_read() Packet P...
77684 Linux Kernel OMAP4 Bridge Networking Interface Network Packet Parsing Remote DoS
77683 Linux Kernel HFS File System Mount Local Privilege Escalation
77658 Linux Kernel hfs_find_init() Function NULL Pointer Dereference Local DoS
77626 Linux Kernel kvm_vm_ioctl_assign_device Function /dev/kym Local DoS
77625 Linux Kernel NFSv4 Mount mknod(2) Syscall Local DoS
77485 Linux Kernel /mm/oom_kill.c Local Overflow
77452 OpenFabrics Enterprise Distribution (OFED) RDS_FLAG_CONG_BITMAP Flagged RDS M...
77450 Linux Kernel security/keys/user_defined.c user_update() Function NULL Pointer...
77360 Linux Kernel TX_SKB_SHARING Local DoS
77355 Linux Kernel clock_gettime() Call Parsing Local DoS
77295 Linux Kernel UFO IPv6 UDP Datagram Parsing Remote DoS
7729