Vulnerabilities > Linux > Linux Kernel > 4.14.90
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-10-05 | CVE-2023-42755 | Out-of-bounds Read vulnerability in multiple products A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. | 5.5 |
2023-10-03 | CVE-2023-4732 | Race Condition vulnerability in multiple products A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. | 4.7 |
2023-09-29 | CVE-2023-44466 | Classic Buffer Overflow vulnerability in Linux Kernel An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. | 8.8 |
2023-09-28 | CVE-2023-42756 | Race Condition vulnerability in multiple products A flaw was found in the Netfilter subsystem of the Linux kernel. | 4.7 |
2023-09-25 | CVE-2023-42753 | Out-of-bounds Write vulnerability in multiple products An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. | 7.8 |
2023-09-25 | CVE-2023-5158 | Unspecified vulnerability in Linux Kernel A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. | 5.5 |
2023-09-18 | CVE-2020-36766 | Unspecified vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 5.8.6. | 3.3 |
2023-09-12 | CVE-2023-4921 | Use After Free vulnerability in multiple products A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8. | 7.8 |
2023-09-06 | CVE-2023-4206 | Use After Free vulnerability in multiple products A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. | 7.8 |
2023-09-06 | CVE-2023-4207 | Use After Free vulnerability in multiple products A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. | 7.8 |