Vulnerabilities > Linux > Linux Kernel > 5.0.13
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-11-09 | CVE-2023-6039 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. | 5.5 |
2023-11-06 | CVE-2023-5090 | Improper Handling of Exceptional Conditions vulnerability in multiple products A flaw was found in KVM. | 5.5 |
2023-11-03 | CVE-2023-47233 | Use After Free vulnerability in Linux Kernel The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. | 4.3 |
2023-11-03 | CVE-2023-1476 | Use After Free vulnerability in multiple products A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. | 7.0 |
2023-11-01 | CVE-2023-1192 | Use After Free vulnerability in multiple products A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. | 6.5 |
2023-11-01 | CVE-2023-1193 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. | 6.5 |
2023-11-01 | CVE-2023-5178 | Use After Free vulnerability in multiple products A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. | 8.8 |
2023-10-29 | CVE-2023-46862 | NULL Pointer Dereference vulnerability in Linux Kernel An issue was discovered in the Linux kernel through 6.5.9. | 4.7 |
2023-10-27 | CVE-2023-46813 | Unspecified vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. | 7.0 |
2023-10-25 | CVE-2023-5717 | Out-of-bounds Write vulnerability in Linux Kernel A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer. We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06. | 7.8 |