Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 6.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-0122
A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an malicious user to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4.
Linux Linux Kernel 6.0
NA
CVE-2022-3170
An out-of-bounds access issue was found in the Linux kernel sound subsystem. It could occur when the 'id->name' provided by the user did not end with '\0'. A privileged local user could pass a specially crafted name through ioctl() interface and crash the s...
Linux Linux Kernel 6.0
NA
CVE-2024-0562
A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi_unregister is called to stop further write-back and waits for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation work after this has completed, w...
Linux Linux Kernel
Linux Linux Kernel 6.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
NA
CVE-2022-3303
A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, ...
Linux Linux Kernel 6.0
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
NA
CVE-2022-2905
An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.
Linux Linux Kernel 6.0
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Debian Debian Linux 10.0
3.6
CVSSv2
CVE-2020-10742
A flaw was found in the Linux kernel. An index buffer overflow during Direct IO write leading to the NFS client to crash. In some cases, a reach out of the index after one memory allocation by kmalloc will cause a kernel panic. The highest threat from this vulnerability is to dat...
Linux Linux Kernel -
Redhat Enterprise Linux 6.0
2.1
CVSSv2
CVE-2019-19338
A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions prior to 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA fl...
Linux Linux Kernel
Redhat Enterprise Linux 6.0
4.9
CVSSv2
CVE-2011-3637
The m_stop function in fs/proc/task_mmu.c in the Linux kernel prior to 2.6.39 allows local users to cause a denial of service (OOPS) via vectors that trigger an m_start error.
Linux Linux Kernel
Redhat Enterprise Linux 6.0
4.9
CVSSv2
CVE-2011-4097
Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel prior to 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Linux Linux Kernel
Redhat Enterprise Linux 6.0
4.9
CVSSv2
CVE-2019-3837
It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabl...
Linux Linux Kernel 2.6.32
Redhat Enterprise Linux 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »