Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 5.10 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-6915
A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.
Linux Linux Kernel
Linux Linux Kernel 6.7
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
6.2
CVSSv2
CVE-2006-3626
Race condition in Linux kernel 2.6.17.4 and previous versions allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.17.2
Linux Linux Kernel 2.6.17.4
Linux Linux Kernel 2.6.16.18
Linux Linux Kernel 2.6.16.13
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.17.3
Linux Linux Kernel 2.6.16.15
Linux Linux Kernel 2.6.16.1
Linux Linux Kernel 2.6.16.11
Linux Linux Kernel 2.6.16.14
Linux Linux Kernel 2.6.16.21
Linux Linux Kernel 2.6.16.23
Linux Linux Kernel 2.6.16.3
Linux Linux Kernel 2.6.17.1
Linux Linux Kernel 2.6.16.22
Linux Linux Kernel 2.6.16.10
NA
CVE-2024-21803
Use After Free vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (bluetooth modules) allows Local Execution of Code. This vulnerability is associated with program files https://gitee.Com/anolis/cloud-kernel/blob/devel-5.10/net/bluetooth/af_bluetooth.C. This issue affe...
Linux Linux Kernel 2.6.12
Linux Linux Kernel
NA
CVE-2021-46921
In the Linux kernel, the following vulnerability has been resolved: locking/qrwlock: Fix ordering in queued_write_lock_slowpath() While this code is executed with the wait_lock held, a reader can acquire the lock without holding wait_lock. The writer side loops checking the value...
Linux Linux Kernel
NA
CVE-2024-26601
In the Linux kernel, the following vulnerability has been resolved: ext4: regenerate buddy after block freeing failed if under fc replay This mostly reverts commit 6bd97bf273bd ("ext4: remove redundant mb_regenerate_buddy()") and reintroduces mb_regenerate_buddy(). Base...
Linux Linux Kernel
NA
CVE-2024-26581
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not y...
Linux Linux Kernel
6.9
CVSSv2
CVE-2020-26541
The Linux kernel up to and including 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.
Linux Linux Kernel
NA
CVE-2023-52447
In the Linux kernel, the following vulnerability has been resolved: bpf: Defer the free of inner map when necessary When updating or deleting an inner map in map array or map htab, the map may still be accessed by non-sleepable program or sleepable program. However bpf_map_fd_put...
Linux Linux Kernel
2.1
CVSSv2
CVE-2021-3655
A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
Linux Linux Kernel 5.14
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Debian Debian Linux 9.0
NA
CVE-2023-6817
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packe...
Linux Linux Kernel 6.7
Linux Linux Kernel
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »