Vulnerabilities > Linux > Linux Kernel > 6.1.34
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-10-13 | CVE-2023-42752 | Integer Overflow or Wraparound vulnerability in Linux Kernel An integer overflow flaw was found in the Linux kernel. | 5.5 |
2023-10-09 | CVE-2023-39189 | Out-of-bounds Read vulnerability in multiple products A flaw was found in the Netfilter subsystem in the Linux kernel. | 6.0 |
2023-10-09 | CVE-2023-39192 | Out-of-bounds Read vulnerability in multiple products A flaw was found in the Netfilter subsystem in the Linux kernel. | 6.0 |
2023-10-09 | CVE-2023-39193 | Out-of-bounds Read vulnerability in multiple products A flaw was found in the Netfilter subsystem in the Linux kernel. | 6.0 |
2023-10-09 | CVE-2023-39194 | Out-of-bounds Read vulnerability in multiple products A flaw was found in the XFRM subsystem in the Linux kernel. | 4.4 |
2023-10-05 | CVE-2023-42754 | NULL Pointer Dereference vulnerability in multiple products A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. | 5.5 |
2023-10-05 | CVE-2023-42755 | Out-of-bounds Read vulnerability in multiple products A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. | 5.5 |
2023-10-04 | CVE-2023-39191 | An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. | 8.2 |
2023-10-03 | CVE-2023-5345 | Use After Free vulnerability in multiple products A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. | 7.8 |
2023-09-29 | CVE-2023-44466 | Classic Buffer Overflow vulnerability in Linux Kernel An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. | 8.8 |