The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. |
|
 |
|
|
Computer vulnerabilities of Android OS
Linux kernel: use after free via tun_get_user
An attacker can force the usage of a freed memory area via tun_get_user() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
1180812, CERTFR-2021-AVI-111, CERTFR-2021-AVI-120, CERTFR-2021-AVI-138, CVE-2021-0342, openSUSE-SU-2021:0241-1, SUSE-SU-2021:0347-1, SUSE-SU-2021:0348-1, SUSE-SU-2021:0353-1, SUSE-SU-2021:0354-1, SUSE-SU-2021:0427-1, SUSE-SU-2021:0433-1, SUSE-SU-2021:0532-1, VIGILANCE-VUL-34506 |
Linux kernel: out-of-bounds memory reading via nl80211_policy
An attacker can force a read at an invalid address via nl80211_polic of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
CERTFR-2021-AVI-021, CERTFR-2021-AVI-035, CERTFR-2021-AVI-111, CERTFR-2021-AVI-120, CERTFR-2021-AVI-125, CVE-2020-27068, openSUSE-SU-2021:0075-1, openSUSE-SU-2021:0242-1, SUSE-SU-2021:0094-1, SUSE-SU-2021:0095-1, SUSE-SU-2021:0096-1, SUSE-SU-2021:0097-1, SUSE-SU-2021:0098-1, SUSE-SU-2021:0108-1, SUSE-SU-2021:0117-1, SUSE-SU-2021:0118-1, SUSE-SU-2021:0133-1, SUSE-SU-2021:0434-1, SUSE-SU-2021:0437-1, SUSE-SU-2021:0438-1, SUSE-SU-2021:0452-1, SUSE-SU-2021:14630-1, VIGILANCE-VUL-34303 |
Linux kernel: use after free via do_epoll_ctl
An attacker can force the usage of a freed memory area via do_epoll_ctl() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2021-AVI-021, CERTFR-2021-AVI-035, CERTFR-2021-AVI-111, CERTFR-2021-AVI-120, CERTFR-2021-AVI-242, CERTFR-2021-AVI-265, CVE-2020-0466, openSUSE-SU-2021:0075-1, openSUSE-SU-2021:0242-1, RHSA-2021:1081-01, RHSA-2021:1093-01, SUSE-SU-2021:0094-1, SUSE-SU-2021:0095-1, SUSE-SU-2021:0096-1, SUSE-SU-2021:0097-1, SUSE-SU-2021:0098-1, SUSE-SU-2021:0108-1, SUSE-SU-2021:0117-1, SUSE-SU-2021:0118-1, SUSE-SU-2021:0133-1, SUSE-SU-2021:0434-1, SUSE-SU-2021:0437-1, SUSE-SU-2021:0438-1, SUSE-SU-2021:0452-1, USN-4912-1, VIGILANCE-VUL-34302 |
Linux kernel: memory corruption via hid-multitouch.c
An attacker can trigger a memory corruption via hid-multitouch.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2021-AVI-021, CERTFR-2021-AVI-035, CERTFR-2021-AVI-111, CERTFR-2021-AVI-120, CERTFR-2021-AVI-125, CERTFR-2021-AVI-265, CVE-2020-0465, openSUSE-SU-2021:0075-1, openSUSE-SU-2021:0242-1, SUSE-SU-2021:0094-1, SUSE-SU-2021:0095-1, SUSE-SU-2021:0096-1, SUSE-SU-2021:0097-1, SUSE-SU-2021:0098-1, SUSE-SU-2021:0108-1, SUSE-SU-2021:0117-1, SUSE-SU-2021:0118-1, SUSE-SU-2021:0133-1, SUSE-SU-2021:0434-1, SUSE-SU-2021:0437-1, SUSE-SU-2021:0438-1, SUSE-SU-2021:0452-1, SUSE-SU-2021:14630-1, USN-4912-1, VIGILANCE-VUL-34301 |
Linux kernel: use after free via audit_data_to_entry
An attacker can force the usage of a freed memory area via audit_data_to_entry() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2021-AVI-021, CERTFR-2021-AVI-035, CERTFR-2021-AVI-111, CERTFR-2021-AVI-120, CERTFR-2021-AVI-158, CERTFR-2021-AVI-184, CVE-2020-0444, openSUSE-SU-2021:0075-1, openSUSE-SU-2021:0242-1, RHSA-2021:0686-01, RHSA-2021:0689-01, RHSA-2021:0763-01, RHSA-2021:0765-01, RHSA-2021:0774-01, SUSE-SU-2021:0094-1, SUSE-SU-2021:0095-1, SUSE-SU-2021:0096-1, SUSE-SU-2021:0097-1, SUSE-SU-2021:0098-1, SUSE-SU-2021:0108-1, SUSE-SU-2021:0117-1, SUSE-SU-2021:0118-1, SUSE-SU-2021:0133-1, SUSE-SU-2021:0434-1, SUSE-SU-2021:0437-1, SUSE-SU-2021:0438-1, SUSE-SU-2021:0452-1, VIGILANCE-VUL-34300 |
Our database contains other pages. You can request a free trial to read them.
Display information about Android OS:
|