Vulnerabilities > Linux > Linux Kernel > 3.4.97
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-05-18 | CVE-2023-1195 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. | 5.5 |
2023-05-18 | CVE-2023-33203 | Race Condition vulnerability in multiple products The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device. | 6.4 |
2023-05-17 | CVE-2023-1859 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. | 4.7 |
2023-05-15 | CVE-2023-2124 | Out-of-bounds Write vulnerability in multiple products An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). | 7.8 |
2023-05-08 | CVE-2023-2513 | Use After Free vulnerability in multiple products A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. | 6.7 |
2023-05-05 | CVE-2023-32269 | Use After Free vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 6.1.11. | 6.7 |
2023-04-26 | CVE-2023-0458 | NULL Pointer Dereference vulnerability in multiple products A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. | 4.7 |
2023-04-24 | CVE-2023-2007 | Improper Locking vulnerability in multiple products The specific flaw exists within the DPT I2O Controller driver. | 7.8 |
2023-04-24 | CVE-2023-2019 | A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. | 4.4 |
2023-04-21 | CVE-2023-1998 | Information Exposure Through Discrepancy vulnerability in multiple products The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. | 5.6 |