Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 3.1.2 vulnerabilities and exploits
(subscribe to this query)
7
CVSSv3
CVE-2022-29582
In the Linux kernel prior to 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.
Linux Linux Kernel
Debian Debian Linux 11.0
1 Github repository
6.6
CVSSv3
CVE-2022-1015
A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.
Linux Linux Kernel
Fedoraproject Fedora 35
11 Github repositories
5.5
CVSSv3
CVE-2022-1263
A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
Linux Linux Kernel 5.18
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
5.5
CVSSv3
CVE-2022-1016
A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged atta...
Linux Linux Kernel
Linux Linux Kernel 3.13
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
2 Github repositories
NA
CVE-2014-8989
The Linux kernel up to and including 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that...
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.15.8
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.15.1
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.12
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.14
Linux Linux Kernel 3.13.1
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.13.10
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
Linux Linux Kernel 3.10.24
Linux Linux Kernel 3.13.11
Linux Linux Kernel 3.0.47
Linux Linux Kernel 3.0.48
Linux Linux Kernel 3.15.3
1 Github repository
NA
CVE-2014-9090
The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel up to and including 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system ca...
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.15.8
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.15.1
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.12
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.14
Linux Linux Kernel 3.13.1
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.13.10
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
Linux Linux Kernel 3.10.24
Linux Linux Kernel 3.13.11
Linux Linux Kernel 3.0.47
Linux Linux Kernel 3.0.48
Linux Linux Kernel 3.15.3
NA
CVE-2012-6647
The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel prior to 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified ot...
Linux Linux Kernel 3.4.75
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.55
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.53
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.4.78
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.4.71
NA
CVE-2014-2889
Off-by-one error in the bpf_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel prior to 3.1.8, when BPF JIT is enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges via a long jump after a conditional jump.
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
Linux Linux Kernel 3.0.47
Linux Linux Kernel 3.0.48
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.36
Linux Linux Kernel 3.0.35
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.58
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.52
Linux Linux Kernel 3.0.51
NA
CVE-2013-7281
The dgram_recvmsg function in net/ieee802154/dgram.c in the Linux kernel prior to 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a...
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.12
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
NA
CVE-2013-7263
The Linux kernel prior to 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, re...
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.12
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »