Vulnerabilities > Linux > Linux Kernel > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-12-18 | CVE-2022-47520 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in the Linux kernel before 6.0.11. | 7.1 |
2022-12-18 | CVE-2022-47521 | Out-of-bounds Write vulnerability in multiple products An issue was discovered in the Linux kernel before 6.0.11. | 7.8 |
2022-11-27 | CVE-2022-45934 | Integer Overflow or Wraparound vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.10. | 7.8 |
2022-11-27 | CVE-2022-45919 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.10. | 7.0 |
2022-11-25 | CVE-2022-45884 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.9. | 7.0 |
2022-11-25 | CVE-2022-45885 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.9. | 7.0 |
2022-11-25 | CVE-2022-45886 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.9. | 7.0 |
2022-11-23 | CVE-2022-42896 | Use After Free vulnerability in Linux Kernel There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url | 8.8 |
2022-11-22 | CVE-2022-3910 | Unspecified vulnerability in Linux Kernel Use After Free vulnerability in Linux Kernel allows Privilege Escalation. | 7.8 |
2022-11-14 | CVE-2022-3238 | Double Free vulnerability in Linux Kernel 6.1 A double-free flaw was found in the Linux kernel’s NTFS3 subsystem in how a user triggers remount and umount simultaneously. | 7.8 |