Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 6.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2023-0122
A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an malicious user to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4.
Linux Linux Kernel 6.0
7.8
CVSSv3
CVE-2022-3170
An out-of-bounds access issue was found in the Linux kernel sound subsystem. It could occur when the 'id->name' provided by the user did not end with '\0'. A privileged local user could pass a specially crafted name through ioctl() interface and crash the s...
Linux Linux Kernel 6.0
5.5
CVSSv3
CVE-2022-2905
An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.
Linux Linux Kernel 6.0
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Debian Debian Linux 10.0
4.7
CVSSv3
CVE-2022-3303
A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, ...
Linux Linux Kernel 6.0
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
7.8
CVSSv3
CVE-2024-0562
A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi_unregister is called to stop further write-back and waits for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation work after this has completed, w...
Linux Linux Kernel
Linux Linux Kernel 6.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
5.5
CVSSv3
CVE-2011-3637
The m_stop function in fs/proc/task_mmu.c in the Linux kernel prior to 2.6.39 allows local users to cause a denial of service (OOPS) via vectors that trigger an m_start error.
Linux Linux Kernel
Redhat Enterprise Linux 6.0
5.5
CVSSv3
CVE-2011-4097
Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel prior to 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Linux Linux Kernel
Redhat Enterprise Linux 6.0
6
CVSSv3
CVE-2020-10742
A flaw was found in the Linux kernel. An index buffer overflow during Direct IO write leading to the NFS client to crash. In some cases, a reach out of the index after one memory allocation by kmalloc will cause a kernel panic. The highest threat from this vulnerability is to dat...
Linux Linux Kernel -
Redhat Enterprise Linux 6.0
5.5
CVSSv3
CVE-2019-19338
A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions prior to 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA fl...
Linux Linux Kernel
Redhat Enterprise Linux 6.0
NA
CVE-2011-3593
A certain Red Hat patch to the vlan_hwaccel_do_receive function in net/8021q/vlan_core.c in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows remote malicious users to cause a denial of service (system crash) via priority-tagged VLAN frames.
Redhat Enterprise Linux 6.0
Linux Linux Kernel 2.6.32
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »