Vulnerabilities > Linux > Linux Kernel > 5.15.122
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-01-15 | CVE-2023-6915 | NULL Pointer Dereference vulnerability in multiple products A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. | 5.5 |
2024-01-12 | CVE-2022-48619 | Unspecified vulnerability in Linux Kernel An issue was discovered in drivers/input/input.c in the Linux kernel before 5.17.10. | 5.5 |
2024-01-12 | CVE-2023-6040 | Out-of-bounds Read vulnerability in multiple products An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access. | 7.8 |
2024-01-11 | CVE-2023-51780 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel before 6.6.8. | 7.0 |
2024-01-11 | CVE-2023-51781 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel before 6.6.8. | 7.0 |
2024-01-11 | CVE-2023-51782 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel before 6.6.8. | 7.0 |
2024-01-08 | CVE-2022-2586 | Use After Free vulnerability in multiple products It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted. | 7.8 |
2024-01-08 | CVE-2022-2602 | Use After Free vulnerability in multiple products io_uring UAF, Unix SCM garbage collection | 7.0 |
2023-12-21 | CVE-2023-6546 | Race Condition vulnerability in multiple products A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. | 7.0 |
2023-12-19 | CVE-2023-6931 | Out-of-bounds Write vulnerability in multiple products A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation. A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group(). We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b. | 7.0 |