Vulnerabilities > Linux > Linux Kernel > 5.10.234
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-02-28 | CVE-2023-22999 | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer). | 5.5 |
2023-02-25 | CVE-2023-26545 | Double Free vulnerability in multiple products In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device. | 4.7 |
2023-02-22 | CVE-2023-23039 | Race Condition vulnerability in Linux Kernel An issue was discovered in the Linux kernel through 6.2.0-rc2. | 5.7 |
2023-02-06 | CVE-2023-0615 | Memory Leak vulnerability in Linux Kernel A memory leak flaw and potential divide by zero and Integer overflow was found in the Linux kernel V4L2 and vivid test code functionality. | 5.5 |
2023-01-26 | CVE-2023-0394 | Unspecified vulnerability in Linux Kernel A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. | 5.5 |
2023-01-12 | CVE-2023-23454 | Type Confusion vulnerability in multiple products cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results). | 5.5 |
2023-01-12 | CVE-2023-23455 | Type Confusion vulnerability in multiple products atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results). | 5.5 |
2022-02-16 | CVE-2021-3773 | A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks. | 9.8 |