Vulnerabilities > Linux > Linux Kernel > 6.5.6
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-10-27 | CVE-2023-46813 | Unspecified vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. | 7.0 |
2023-10-25 | CVE-2023-5717 | Out-of-bounds Write vulnerability in Linux Kernel A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer. We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06. | 7.8 |
2023-10-23 | CVE-2023-5633 | Use After Free vulnerability in multiple products The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. | 7.8 |
2023-10-13 | CVE-2023-42752 | Integer Overflow or Wraparound vulnerability in Linux Kernel An integer overflow flaw was found in the Linux kernel. | 5.5 |
2023-10-09 | CVE-2023-39189 | Out-of-bounds Read vulnerability in multiple products A flaw was found in the Netfilter subsystem in the Linux kernel. | 6.0 |
2023-10-09 | CVE-2023-39192 | Out-of-bounds Read vulnerability in multiple products A flaw was found in the Netfilter subsystem in the Linux kernel. | 6.0 |
2023-10-09 | CVE-2023-39193 | Out-of-bounds Read vulnerability in multiple products A flaw was found in the Netfilter subsystem in the Linux kernel. | 6.0 |
2023-10-05 | CVE-2023-42754 | NULL Pointer Dereference vulnerability in multiple products A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. | 5.5 |
2023-10-03 | CVE-2023-5345 | Use After Free vulnerability in multiple products A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. | 7.8 |
2023-09-28 | CVE-2023-42756 | Race Condition vulnerability in multiple products A flaw was found in the Netfilter subsystem of the Linux kernel. | 4.7 |