Vulnerabilities > Linux > Linux Kernel > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-03-23 | CVE-2023-28772 | Classic Buffer Overflow vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 5.13.3. | 7.8 |
2023-03-22 | CVE-2023-0386 | Unspecified vulnerability in Linux Kernel A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. | 7.8 |
2023-03-22 | CVE-2022-4095 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in Linux kernel before 5.19.2. | 7.8 |
2023-03-22 | CVE-2023-1281 | Use After Free vulnerability in Linux Kernel Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. | 7.8 |
2023-03-19 | CVE-2022-48423 | Unspecified vulnerability in Linux Kernel In the Linux kernel before 6.1.3, fs/ntfs3/record.c does not validate resident attribute names. | 7.8 |
2023-03-19 | CVE-2022-48424 | Unspecified vulnerability in Linux Kernel In the Linux kernel before 6.1.3, fs/ntfs3/inode.c does not validate the attribute name offset. | 7.8 |
2023-03-19 | CVE-2022-48425 | Release of Invalid Pointer or Reference vulnerability in Linux Kernel In the Linux kernel through 6.2.7, fs/ntfs3/inode.c has an invalid kfree because it does not validate MFT flags before replaying logs. | 7.8 |
2023-03-16 | CVE-2023-1390 | Unspecified vulnerability in Linux Kernel A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. | 7.5 |
2023-03-16 | CVE-2023-28466 | NULL Pointer Dereference vulnerability in Linux Kernel do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). | 7.0 |
2023-03-08 | CVE-2023-0030 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. | 7.8 |