Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 6.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-42432
This vulnerability allows local malicious users to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The spec...
Linux Linux Kernel 6.0
NA
CVE-2022-3170
An out-of-bounds access issue was found in the Linux kernel sound subsystem. It could occur when the 'id->name' provided by the user did not end with '\0'. A privileged local user could pass a specially crafted name through ioctl() interface and crash the s...
Linux Linux Kernel 6.0
NA
CVE-2022-3303
A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, ...
Linux Linux Kernel 6.0
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
NA
CVE-2022-2905
An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.
Linux Linux Kernel 6.0
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Debian Debian Linux 10.0
NA
CVE-2024-0562
A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi_unregister is called to stop further write-back and waits for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation work after this has completed, w...
Linux Linux Kernel
Linux Linux Kernel 6.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
2.1
CVSSv2
CVE-2019-19338
A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions prior to 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA fl...
Linux Linux Kernel
Redhat Enterprise Linux 6.0
4.9
CVSSv2
CVE-2011-4097
Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel prior to 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Linux Linux Kernel
Redhat Enterprise Linux 6.0
3.6
CVSSv2
CVE-2020-10742
A flaw was found in the Linux kernel. An index buffer overflow during Direct IO write leading to the NFS client to crash. In some cases, a reach out of the index after one memory allocation by kmalloc will cause a kernel panic. The highest threat from this vulnerability is to dat...
Linux Linux Kernel -
Redhat Enterprise Linux 6.0
4.9
CVSSv2
CVE-2011-3637
The m_stop function in fs/proc/task_mmu.c in the Linux kernel prior to 2.6.39 allows local users to cause a denial of service (OOPS) via vectors that trigger an m_start error.
Linux Linux Kernel
Redhat Enterprise Linux 6.0
5.7
CVSSv2
CVE-2011-3593
A certain Red Hat patch to the vlan_hwaccel_do_receive function in net/8021q/vlan_core.c in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows remote malicious users to cause a denial of service (system crash) via priority-tagged VLAN frames.
Redhat Enterprise Linux 6.0
Linux Linux Kernel 2.6.32
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »