Vulnerabilities > Linux > Linux Kernel > 4.19.98
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-10-17 | CVE-2022-3544 | Unspecified vulnerability in Linux Kernel A vulnerability, which was classified as problematic, was found in Linux Kernel. | 5.5 |
2022-10-17 | CVE-2022-3545 | A vulnerability has been found in Linux Kernel and classified as critical. | 7.8 |
2022-10-17 | CVE-2022-3533 | Unspecified vulnerability in Linux Kernel A vulnerability was found in Linux Kernel. low complexity linux | 5.7 |
2022-10-16 | CVE-2022-3521 | A vulnerability has been found in Linux Kernel and classified as problematic. | 2.5 |
2022-10-09 | CVE-2022-42703 | Use After Free vulnerability in Linux Kernel mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse. | 5.5 |
2022-09-30 | CVE-2022-41848 | Use After Free vulnerability in Linux Kernel drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach. | 4.2 |
2022-09-30 | CVE-2022-41849 | Use After Free vulnerability in multiple products drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect. | 4.2 |
2022-09-30 | CVE-2022-41850 | Use After Free vulnerability in multiple products roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress. | 4.7 |
2022-09-27 | CVE-2022-3303 | A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. | 4.7 |
2022-09-23 | CVE-2022-2785 | Out-of-bounds Read vulnerability in Linux Kernel There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. | 5.5 |