Vulnerabilities > Linux > Linux Kernel > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-03-22 | CVE-2023-1281 | Use After Free vulnerability in Linux Kernel Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2. | 7.8 |
2023-03-19 | CVE-2022-48423 | Out-of-bounds Write vulnerability in Linux Kernel In the Linux kernel before 6.1.3, fs/ntfs3/record.c does not validate resident attribute names. | 7.8 |
2023-03-19 | CVE-2022-48424 | Unspecified vulnerability in Linux Kernel In the Linux kernel before 6.1.3, fs/ntfs3/inode.c does not validate the attribute name offset. | 7.8 |
2023-03-19 | CVE-2022-48425 | Release of Invalid Pointer or Reference vulnerability in Linux Kernel In the Linux kernel through 6.2.7, fs/ntfs3/inode.c has an invalid kfree because it does not validate MFT flags before replaying logs. | 7.8 |
2023-03-16 | CVE-2023-1390 | Unspecified vulnerability in Linux Kernel A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. | 7.5 |
2023-03-16 | CVE-2023-28466 | NULL Pointer Dereference vulnerability in multiple products do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). | 7.0 |
2023-03-08 | CVE-2023-0030 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. | 7.8 |
2023-03-06 | CVE-2022-3424 | Use After Free vulnerability in multiple products A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. | 7.8 |
2023-03-02 | CVE-2023-1118 | Use After Free vulnerability in Linux Kernel A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. | 7.8 |
2023-02-28 | CVE-2023-0461 | Use After Free vulnerability in Linux Kernel There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. | 7.8 |