Vulnerabilities > Linux > Linux Kernel > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-02-27 | CVE-2021-46934 | Improper Check for Unusual or Exceptional Conditions vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: i2c: validate user data in compat ioctl Wrong user data may cause warning in i2c_transfer(), ex: zero msgs. Userspace should not be able to trigger warnings, so this patch adds validation checks for user data in compact ioctl to prevent reported warnings | 3.3 |
2023-09-18 | CVE-2020-36766 | Unspecified vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 5.8.6. | 3.3 |
2023-03-23 | CVE-2023-1513 | Improper Initialization vulnerability in multiple products A flaw was found in KVM. | 3.3 |
2022-10-21 | CVE-2022-3633 | Memory Leak vulnerability in multiple products A vulnerability classified as problematic has been found in Linux Kernel. | 3.3 |
2022-10-21 | CVE-2022-3629 | Memory Leak vulnerability in multiple products A vulnerability was found in Linux Kernel. | 3.3 |
2022-10-21 | CVE-2022-3624 | Memory Leak vulnerability in Linux Kernel A vulnerability was found in Linux Kernel and classified as problematic. | 3.3 |
2022-10-16 | CVE-2022-3521 | Race Condition vulnerability in multiple products A vulnerability has been found in Linux Kernel and classified as problematic. | 2.5 |
2022-07-12 | CVE-2011-4916 | Information Exposure vulnerability in Linux Kernel Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /dev/pts/ and /dev/tty*. | 2.1 |
2022-06-18 | CVE-2022-33981 | Use After Free vulnerability in multiple products drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function. | 3.3 |
2022-06-05 | CVE-2022-32296 | Use of Insufficiently Random Values vulnerability in Linux Kernel The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. | 3.3 |