Vulnerabilities > Linux
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-02-05 | CVE-2024-23196 | NULL Pointer Dereference vulnerability in Linux Kernel A race condition was found in the Linux kernel's sound/hda device driver in snd_hdac_regmap_sync() function. | 4.7 |
2024-02-05 | CVE-2024-24855 | NULL Pointer Dereference vulnerability in Linux Kernel A race condition was found in the Linux kernel's scsi device driver in lpfc_unregister_fcf_rescan() function. | 4.7 |
2024-02-05 | CVE-2024-24857 | Integer Overflow or Wraparound vulnerability in Linux Kernel A race condition was found in the Linux kernel's net/bluetooth device driver in conn_info_{min,max}_age_set() function. | 6.8 |
2024-02-05 | CVE-2024-24858 | Race Condition vulnerability in Linux Kernel A race condition was found in the Linux kernel's net/bluetooth in {conn,adv}_{min,max}_interval_set() function. | 5.3 |
2024-02-05 | CVE-2024-24859 | Race Condition vulnerability in Linux Kernel A race condition was found in the Linux kernel's net/bluetooth in sniff_{min,max}_interval_set() function. | 4.8 |
2024-02-05 | CVE-2024-24860 | NULL Pointer Dereference vulnerability in Linux Kernel A race condition was found in the Linux kernel's bluetooth device driver in {min,max}_key_size_set() function. | 5.3 |
2024-02-05 | CVE-2024-24861 | Race Condition vulnerability in Linux Kernel A race condition was found in the Linux kernel's media/xc4000 device driver in xc4000 xc4000_get_frequency() function. | 6.3 |
2024-02-05 | CVE-2024-24864 | NULL Pointer Dereference vulnerability in Linux Kernel A race condition was found in the Linux kernel's media/dvb-core in dvbdmx_write() function. | 4.7 |
2024-02-04 | CVE-2023-6240 | A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. | 6.5 |
2024-01-31 | CVE-2024-1085 | Use After Free vulnerability in Linux Kernel A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability. We recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7. | 7.8 |