Vulnerabilities > Linux > Linux Kernel > 6.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-01-10 | CVE-2022-4379 | Use After Free vulnerability in multiple products A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. | 7.5 |
2023-01-09 | CVE-2022-2196 | Insecure Default Initialization of Resource vulnerability in multiple products A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. | 8.8 |
2022-11-30 | CVE-2022-45869 | Race Condition vulnerability in Linux Kernel A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled. | 5.5 |
2022-11-27 | CVE-2022-45919 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.10. | 7.0 |
2022-11-25 | CVE-2022-45886 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.9. | 7.0 |
2022-11-14 | CVE-2022-3238 | Double Free vulnerability in Linux Kernel 6.1 A double-free flaw was found in the Linux kernel’s NTFS3 subsystem in how a user triggers remount and umount simultaneously. | 7.8 |
2022-11-14 | CVE-2022-3903 | Type Confusion vulnerability in Linux Kernel 6.1 An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. | 4.6 |
2022-10-19 | CVE-2022-3606 | Improper Resource Shutdown or Release vulnerability in Linux Kernel A vulnerability was found in Linux Kernel. | 5.5 |
2022-10-17 | CVE-2022-3533 | Improper Resource Shutdown or Release vulnerability in Linux Kernel A vulnerability was found in Linux Kernel. | 5.7 |
2022-09-23 | CVE-2022-2785 | Out-of-bounds Read vulnerability in Linux Kernel There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. | 5.5 |