Vulnerabilities > Linux > Linux Kernel > 5.4.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-04-29 | CVE-2022-1015 | Out-of-bounds Write vulnerability in multiple products A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. | 6.6 |
2022-04-29 | CVE-2022-1048 | Use After Free vulnerability in multiple products A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. | 7.0 |
2022-04-29 | CVE-2022-1195 | Use After Free vulnerability in multiple products A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. | 5.5 |
2022-04-22 | CVE-2022-29582 | Race Condition vulnerability in multiple products In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. | 7.0 |
2022-04-13 | CVE-2022-29156 | Double Free vulnerability in multiple products drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release. | 7.8 |
2022-04-11 | CVE-2022-28893 | Use After Free vulnerability in multiple products The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state. | 7.8 |
2022-04-02 | CVE-2022-28356 | In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c. | 5.5 |
2022-04-01 | CVE-2021-3847 | Improper Preservation of Permissions vulnerability in multiple products An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. | 7.2 |
2022-03-30 | CVE-2020-35501 | A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem | 3.4 |
2022-03-29 | CVE-2022-1055 | Use After Free vulnerability in multiple products A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. | 7.8 |