Vulnerabilities > Linux > Linux Kernel > 6.6.1

DATE CVE VULNERABILITY TITLE RISK
2024-02-11 CVE-2024-1151 Out-of-bounds Write vulnerability in multiple products
A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel.
local
low complexity
debian redhat fedoraproject linux CWE-787
5.5
2024-02-07 CVE-2023-6356 A flaw was found in the Linux kernel's NVMe driver.
network
low complexity
redhat linux debian
7.5
2024-02-07 CVE-2023-6536 A flaw was found in the Linux kernel's NVMe driver.
network
low complexity
linux redhat debian
7.5
2024-02-05 CVE-2024-24857 Integer Overflow or Wraparound vulnerability in multiple products
A race condition was found in the Linux kernel's net/bluetooth device driver in conn_info_{min,max}_age_set() function.
high complexity
debian linux CWE-190
6.8
2024-02-05 CVE-2024-24858 Race Condition vulnerability in multiple products
A race condition was found in the Linux kernel's net/bluetooth in {conn,adv}_{min,max}_interval_set() function.
high complexity
debian linux CWE-362
5.3
2024-02-05 CVE-2024-24859 Race Condition vulnerability in Linux Kernel
A race condition was found in the Linux kernel's net/bluetooth in sniff_{min,max}_interval_set() function.
high complexity
linux CWE-362
4.8
2024-02-05 CVE-2024-24860 NULL Pointer Dereference vulnerability in Linux Kernel
A race condition was found in the Linux kernel's bluetooth device driver in {min,max}_key_size_set() function.
high complexity
linux CWE-476
5.3
2024-02-05 CVE-2024-24861 Race Condition vulnerability in Linux Kernel
A race condition was found in the Linux kernel's media/xc4000 device driver in xc4000 xc4000_get_frequency() function.
local
high complexity
linux CWE-362
6.3
2024-02-05 CVE-2024-24864 NULL Pointer Dereference vulnerability in Linux Kernel
A race condition was found in the Linux kernel's media/dvb-core in dvbdmx_write() function.
local
high complexity
linux CWE-476
4.7
2024-01-31 CVE-2024-1085 Use After Free vulnerability in Linux Kernel
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability. We recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.
local
low complexity
linux CWE-416
7.8