Linux Vulnerabilities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Type

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Product

Linux Kernel5207
Linux Foundation Xen122
Linux Foundation ONOS8
Linux Foundation cups-filters5
Linux Foundation xen5

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation

Official Fix4896
Temporary Fix0
Workaround15
Unavailable13
Not Defined463

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High28
Functional3
Proof-of-Concept539
Unproven229
Not Defined4588

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector

Not Defined0
Physical61
Local1967
Adjacent2408
Network951

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication

Not Defined0
High58
Low3483
None1846

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction

Not Defined0
Required78
None5309

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base

≤10
≤20
≤3118
≤4625
≤5872
≤61848
≤7953
≤8616
≤9231
≤10124

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤3135
≤4638
≤5977
≤62086
≤7772
≤8517
≤9204
≤1058

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤21
≤3154
≤4884
≤5685
≤62047
≤7632
≤8627
≤9201
≤10156

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤39
≤428
≤5151
≤6509
≤7193
≤8547
≤934
≤1060

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤35
≤413
≤534
≤663
≤751
≤879
≤92
≤102

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤61
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day

<1k33
<2k80
<5k1019
<10k3019
<25k1042
<50k186
<100k7
≥100k1

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k3493
<2k910
<5k696
<10k229
<25k59
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Products (32): Board-TNK (1), CPU (1), DeepOfix (1), Enterprise Server (1), Heartbeat (2), Jami (2), Kernel (5207), LibThai (1), MySQL (1), MySQLDatabase Admin Tool (1), News-TNK (1), Nslookup (1), OCF Resource Agents (1), ONOS (8), ONOS SDN Controller (1), Sblim-sfcb (2), Traceroute Script (1), UMIP (2), XEN (1), Xen (122), Xen Elf Parser (3), Xreader (2), cups-filters (5), foomatic (1), heartbeat (2), libvchan (1), nfs-utils (3), php Download Manager (1), php User Base (1), sblim-sfcb (4), xen (5), zephyr (1)

Link to Vendor Website: https://www.kernel.org/

PublishedBaseTempVulnerabilityProdExpRemEPSSCTICVE
05/24/20245.75.5Linux Kernel r8188eu rtw_wx_read32 memory leakOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47570
05/24/20245.75.5Linux Kernel ksmbd get_file_stream_info memory leakOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47568
05/24/20245.75.5Linux Kernel devfreq reference countOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47532
05/24/20245.75.5Linux Kernel netif_carrier_off null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47560
05/24/20245.75.5Linux Kernel rxrpc_lookup_peer memory leakOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47538
05/24/20248.07.6Linux Kernel emergency_ctx stack-based overflowOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47567
05/24/20244.64.4Linux Kernel drm_gem_mmap_obj state issueOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47531
05/24/20242.62.5Linux Kernel io_uring io_uring.c denial of serviceOperating SystemNot DefinedOfficial Fix0.000000.12CVE-2021-47569
05/24/20245.75.5Linux Kernel mpt3sas sas_target denial of serviceOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47565
05/24/20247.16.8Linux Kernel marvell prestera_bridge_port_join double freeOperating SystemNot DefinedOfficial Fix0.000000.16CVE-2021-47564
05/24/20244.84.6Linux Kernel num_possible_cpus null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47562
05/24/20245.75.5Linux Kernel smc_vlan_by_tcpsk null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000000.12CVE-2021-47559
05/24/20245.75.5Linux Kernel register_vlan_dev reference countOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47555
05/24/20245.75.5Linux Kernel ethtool_set_coalesce null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47556
05/24/20244.84.6Linux Kernel blk-mq disk_release null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47552
05/24/20245.75.5Linux Kernel start_cpsch initializationOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47551
05/24/20245.75.5Linux Kernel amdgpu_get_xgmi_hive memory leakOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47550
05/24/20243.53.4Linux Kernel tulip out-of-boundsOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47547
05/24/20245.75.5Linux Kernel perf report perf_tip memory leakOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47543
05/24/20244.84.6Linux Kernel Virtual Address mt7915_get_phy_mode null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47540
05/24/20245.75.5Linux Kernel rxrpc_look_up_bundle memory leakOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47539
05/24/20245.75.5Linux Kernel iwlwifi reduce_power_data memory leakOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47529
05/24/20248.07.6Linux Kernel smc_lgr_cleanup_early memory corruptionOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47536
05/24/20245.75.5Linux Kernel remove null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47526
05/24/20248.07.6Linux Kernel liteuart use after freeOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47525
05/24/20245.75.5Linux Kernel liteuart allocation of resourcesOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47524
05/24/20245.75.5Linux Kernel hfi1_init allocation of resourcesOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47523
05/24/20245.75.5Linux Kernel bigbenff report_field null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000000.12CVE-2021-47522
05/24/20248.07.6Linux Kernel sja1000 ems_pcmcia_add_card use after freeOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47521
05/24/20248.07.6Linux Kernel pch_can use after freeOperating SystemNot DefinedOfficial Fix0.000000.12CVE-2021-47520
05/24/20245.75.5Linux Kernel m_can_read_fifo memory leakOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47519
05/24/20245.75.5Linux Kernel nfc null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47518
05/24/20245.75.5Linux Kernel nfp_cpp_area_cache_add memory leakOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47516
05/24/20245.75.5Linux Kernel devlink_nl_cmd_reload reference countOperating SystemNot DefinedOfficial Fix0.000000.12CVE-2021-47514
05/24/20248.07.6Linux Kernel ALSA size_t buffer overflowOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47511
05/24/20248.07.6Linux Kernel sched dump_stack.c fq_pie_destroy stack-based overflowOperating SystemNot DefinedOfficial Fix0.000000.11CVE-2021-47512
05/24/20245.55.3Linux Kernel n_gsm Privilege EscalationOperating SystemNot DefinedOfficial Fix0.000000.19CVE-2023-52880
05/24/20248.07.6Linux Kernel staging _rtl92e_pci_disconnect use after freeOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47571
05/24/20248.07.6Linux Kernel vmcore clear_user memory corruptionOperating SystemNot DefinedOfficial Fix0.000000.12CVE-2021-47566
05/24/20244.84.6Linux Kernel stmmac netif_tx_disable denial of serviceOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47558
05/24/20245.55.3Linux Kernel sched bringup_cpu initializationOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47553
05/24/20245.35.1Linux Kernel ipv6 fib6_rule_suppress memory leakOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47546
05/24/20245.75.5Linux Kernel octeontx2-af rvu_mbox_init memory leakOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47537
05/24/20245.75.5Linux Kernel drm_crtc_commit_put memory leakOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47534
05/24/20248.07.6Linux Kernel drm_crtc_commit_put use after freeOperating SystemNot DefinedOfficial Fix0.000000.04CVE-2021-47533
05/24/20245.75.5Linux Kernel wait_fence memory leakOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47530
05/24/20245.75.5Linux Kernel usb cdnsp_endpoint_init null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000000.17CVE-2021-47528
05/24/20247.16.8Linux Kernel ethtool use after freeOperating SystemNot DefinedOfficial Fix0.000000.08CVE-2021-47517
05/24/20245.75.5Linux Kernel ip_input.c seg6_do_srh_encap null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47515
05/24/20245.75.5Linux Kernel felix_setup_mmio_filtering memory leakOperating SystemNot DefinedOfficial Fix0.000000.00CVE-2021-47513

5337 more entries are not shown

Do you know our Splunk app?

Download it now for free!