Vulnerabilities > Linux > Linux Kernel > 6.1.12
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-05-01 | CVE-2023-2235 | Use After Free vulnerability in Linux Kernel A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2. | 7.8 |
2023-04-28 | CVE-2023-31436 | Out-of-bounds Write vulnerability in Linux Kernel qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX. | 7.8 |
2023-04-21 | CVE-2023-1998 | Information Exposure Through Discrepancy vulnerability in multiple products The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. | 5.6 |
2023-04-20 | CVE-2023-2176 | Out-of-bounds Read vulnerability in Linux Kernel A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. | 7.8 |
2023-04-20 | CVE-2023-2194 | Out-of-bounds Write vulnerability in multiple products An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. | 6.7 |
2023-04-19 | CVE-2023-28328 | NULL Pointer Dereference vulnerability in multiple products A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. | 5.5 |
2023-04-19 | CVE-2023-2162 | Use After Free vulnerability in Linux Kernel A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. | 5.5 |
2023-04-16 | CVE-2023-30772 | Use After Free vulnerability in Linux Kernel The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device. | 6.4 |
2023-04-12 | CVE-2023-1990 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. | 4.7 |
2023-04-12 | CVE-2023-1829 | Use After Free vulnerability in Linux Kernel A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. | 7.8 |