Vulnerabilities > Linux > Linux Kernel > 4.14.109
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-03-27 | CVE-2023-1079 | Use After Free vulnerability in Linux Kernel A flaw was found in the Linux kernel. | 6.8 |
2023-03-27 | CVE-2023-1380 | Out-of-bounds Read vulnerability in multiple products A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. | 7.1 |
2023-03-23 | CVE-2023-0590 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. | 4.7 |
2023-03-23 | CVE-2023-1513 | Improper Initialization vulnerability in multiple products A flaw was found in KVM. | 3.3 |
2023-03-23 | CVE-2023-28772 | Classic Buffer Overflow vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 5.13.3. | 6.7 |
2023-03-22 | CVE-2022-4095 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in Linux kernel before 5.19.2. | 7.8 |
2023-03-22 | CVE-2023-1281 | Use After Free vulnerability in Linux Kernel Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2. | 7.8 |
2023-03-19 | CVE-2022-48423 | Out-of-bounds Write vulnerability in Linux Kernel In the Linux kernel before 6.1.3, fs/ntfs3/record.c does not validate resident attribute names. | 7.8 |
2023-03-16 | CVE-2023-1390 | Unspecified vulnerability in Linux Kernel A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. | 7.5 |
2023-03-16 | CVE-2023-28466 | NULL Pointer Dereference vulnerability in multiple products do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). | 7.0 |