Vulnerabilities > Linux > Linux Kernel > 4.4.78
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-06-09 | CVE-2023-3141 | Use After Free vulnerability in multiple products A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. | 7.1 |
2023-06-05 | CVE-2023-3111 | Use After Free vulnerability in multiple products A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. | 7.8 |
2023-06-01 | CVE-2023-2985 | Use After Free vulnerability in Linux Kernel A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. | 5.5 |
2023-05-31 | CVE-2023-34256 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in the Linux kernel before 6.3.3. | 5.5 |
2023-05-26 | CVE-2023-2002 | Incorrect Authorization vulnerability in multiple products A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. | 6.8 |
2023-05-25 | CVE-2023-0459 | Release of Invalid Pointer or Reference vulnerability in Linux Kernel Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). | 5.5 |
2023-05-22 | CVE-2023-33288 | Use After Free vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 6.2.9. | 4.7 |
2023-05-21 | CVE-2020-36694 | Use After Free vulnerability in Linux Kernel An issue was discovered in netfilter in the Linux kernel before 5.10. | 6.7 |
2023-05-18 | CVE-2023-1195 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. | 5.5 |
2023-05-18 | CVE-2023-33203 | Race Condition vulnerability in multiple products The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device. | 6.4 |