Total vulnerabilities in the database
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | 5.16-rc2 | 5.16-rc2.x |
linux / linux_kernel | 5.16-rc3 | 5.16-rc3.x |
linux / linux_kernel | 5.16-rc1 | 5.16-rc1.x |
debian / debian_linux | 9.0 | 9.0.x |
debian / debian_linux | 10.0 | 10.0.x |
oracle / communications_cloud_native_core_binding_support_function | 22.1.3 | 22.1.3.x |
oracle / communications_cloud_native_core_policy | 22.2.0 | 22.2.0.x |
oracle / communications_cloud_native_core_network_exposure_function | 22.1.1 | 22.1.1.x |
linux / linux_kernel | 4.10 | 4.14.257 |
linux / linux_kernel | 4.5 | 4.9.292 |
linux / linux_kernel | 5.11 | 5.15.7 |
linux / linux_kernel | 5.5.0 | 5.10.84 |
linux / linux_kernel | 4.20 | 5.4.164 |
linux / linux_kernel | 4.15 | 4.19.220 |
linux / linux_kernel | - | 4.4.294 |