Vulnerabilities > Linux > Linux Kernel > 6.1.110
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-01-15 | CVE-2024-0565 | Integer Underflow (Wrap or Wraparound) vulnerability in multiple products An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. | 7.4 |
2024-01-15 | CVE-2023-6915 | NULL Pointer Dereference vulnerability in multiple products A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. | 5.5 |
2024-01-11 | CVE-2023-51780 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel before 6.6.8. | 7.0 |
2024-01-11 | CVE-2023-51781 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel before 6.6.8. | 7.0 |
2024-01-11 | CVE-2023-51782 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel before 6.6.8. | 7.0 |
2024-01-09 | CVE-2024-0340 | Unspecified vulnerability in Linux Kernel A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. | 5.5 |
2024-01-08 | CVE-2023-1032 | Double Free vulnerability in multiple products The Linux kernel io_uring IORING_OP_SOCKET operation contained a double free in function __sys_socket_file() in file net/socket.c. | 5.5 |
2024-01-02 | CVE-2023-7192 | Memory Leak vulnerability in multiple products A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. | 4.4 |
2023-12-21 | CVE-2023-6546 | Race Condition vulnerability in multiple products A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. | 7.0 |
2023-12-19 | CVE-2023-6931 | Out-of-bounds Write vulnerability in multiple products A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation. A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group(). We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b. | 7.0 |