Vulnerabilities > Linux > Linux Kernel > 6.7.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-01-28 | CVE-2024-0841 | A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. | 7.8 |
2024-01-25 | CVE-2024-23307 | Integer Overflow or Wraparound vulnerability in Linux Kernel Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow. | 7.8 |
2024-01-04 | CVE-2023-6270 | Use After Free vulnerability in multiple products A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. | 7.0 |
2023-12-09 | CVE-2023-50431 | Unspecified vulnerability in Linux Kernel sec_attest_info in drivers/accel/habanalabs/common/habanalabs_ioctl.c in the Linux kernel through 6.6.5 allows an information leak to user space because info->pad0 is not initialized. | 5.5 |
2023-01-17 | CVE-2022-41858 | NULL Pointer Dereference vulnerability in multiple products A flaw was found in the Linux kernel. | 7.1 |
2022-09-23 | CVE-2022-2785 | Out-of-bounds Read vulnerability in Linux Kernel There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. | 5.5 |
2022-09-14 | CVE-2022-3202 | A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. | 7.1 |
2022-09-09 | CVE-2022-38096 | NULL Pointer Dereference vulnerability in Linux Kernel A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. | 5.5 |
2022-08-29 | CVE-2022-0850 | Unspecified vulnerability in Linux Kernel A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace. | 7.1 |
2022-03-03 | CVE-2021-3640 | A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. | 7.0 |