Vulnerabilities > Linux > Linux Kernel > 4.11.10

DATE CVE VULNERABILITY TITLE RISK
2023-10-09 CVE-2023-39193 Out-of-bounds Read vulnerability in multiple products
A flaw was found in the Netfilter subsystem in the Linux kernel.
local
low complexity
linux redhat fedoraproject CWE-125
6.0
2023-10-09 CVE-2023-39194 Out-of-bounds Read vulnerability in multiple products
A flaw was found in the XFRM subsystem in the Linux kernel.
local
low complexity
linux redhat fedoraproject CWE-125
4.4
2023-10-05 CVE-2023-42754 NULL Pointer Dereference vulnerability in multiple products
A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack.
local
low complexity
linux redhat fedoraproject CWE-476
5.5
2023-10-05 CVE-2023-42755 Out-of-bounds Read vulnerability in multiple products
A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel.
local
low complexity
linux redhat debian CWE-125
5.5
2023-10-03 CVE-2023-4732 Race Condition vulnerability in multiple products
A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel.
local
high complexity
linux redhat CWE-362
4.7
2023-09-29 CVE-2023-44466 Classic Buffer Overflow vulnerability in Linux Kernel
An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5.
network
low complexity
linux CWE-120
8.8
2023-09-28 CVE-2023-42756 Race Condition vulnerability in multiple products
A flaw was found in the Netfilter subsystem of the Linux kernel.
local
high complexity
linux redhat debian fedoraproject CWE-362
4.7
2023-09-25 CVE-2023-5158 Unspecified vulnerability in Linux Kernel
A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel.
local
low complexity
linux
5.5
2023-09-18 CVE-2020-36766 Unspecified vulnerability in Linux Kernel
An issue was discovered in the Linux kernel before 5.8.6.
local
low complexity
linux
3.3
2023-09-12 CVE-2023-4921 Use After Free vulnerability in multiple products
A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.
local
low complexity
linux debian CWE-416
7.8