Vulnerabilities > Linux > Linux Kernel > 4.14.42
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-07-24 | CVE-2023-2860 | Out-of-bounds Read vulnerability in Linux Kernel An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. | 4.4 |
2023-07-24 | CVE-2023-33951 | Improper Locking vulnerability in multiple products A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. | 5.3 |
2023-07-24 | CVE-2023-33952 | Double Free vulnerability in multiple products A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. | 6.7 |
2023-07-24 | CVE-2023-3567 | Use After Free vulnerability in multiple products A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. | 7.1 |
2023-07-24 | CVE-2023-3863 | Use After Free vulnerability in multiple products A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. | 4.1 |
2023-07-21 | CVE-2023-3609 | Use After Free vulnerability in multiple products A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). | 7.8 |
2023-07-21 | CVE-2023-3611 | Out-of-bounds Write vulnerability in multiple products An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64. | 7.8 |
2023-07-21 | CVE-2023-3776 | Use After Free vulnerability in multiple products A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). | 7.8 |
2023-07-18 | CVE-2023-0160 | Improper Locking vulnerability in multiple products A deadlock flaw was found in the Linux kernel’s BPF subsystem. | 5.5 |
2023-07-17 | CVE-2023-38409 | Unspecified vulnerability in Linux Kernel An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. | 5.5 |