Vulnerabilities > Linux > Linux Kernel > 5.15.161

DATE CVE VULNERABILITY TITLE RISK
2022-09-05 CVE-2022-39842 Integer Overflow or Wraparound vulnerability in multiple products
An issue was discovered in the Linux kernel before 5.19.
local
low complexity
linux debian CWE-190
6.1
2022-09-02 CVE-2022-39188 Race Condition vulnerability in multiple products
An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19.
local
high complexity
linux debian CWE-362
4.7
2022-09-02 CVE-2022-39190 An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6.
local
low complexity
linux debian
5.5
2022-09-01 CVE-2022-3078 NULL Pointer Dereference vulnerability in Linux Kernel
An issue was discovered in the Linux kernel through 5.16-rc6.
local
low complexity
linux CWE-476
5.5
2022-08-31 CVE-2022-1205 NULL Pointer Dereference vulnerability in Linux Kernel
A NULL pointer dereference flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol.
local
high complexity
linux CWE-476
4.7
2022-08-31 CVE-2022-1263 NULL Pointer Dereference vulnerability in multiple products
A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled.
local
low complexity
linux redhat CWE-476
5.5
2022-08-31 CVE-2022-2153 A flaw was found in the Linux kernel’s KVM when attempting to set a SynIC IRQ.
local
low complexity
linux fedoraproject redhat debian
5.5
2022-08-29 CVE-2022-0850 Unspecified vulnerability in Linux Kernel
A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.
local
low complexity
linux
7.1
2022-08-29 CVE-2022-1016 Missing Initialization of Resource vulnerability in multiple products
A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free.
local
low complexity
linux redhat CWE-909
5.5
2022-08-29 CVE-2022-1198 Use After Free vulnerability in multiple products
A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.
local
low complexity
linux redhat CWE-416
5.5