Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 5.10 vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2024-23849
In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel up to and including 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.
Linux Linux Kernel
6.7
CVSSv3
CVE-2020-36694
An issue exists in netfilter in the Linux kernel prior to 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability...
Linux Linux Kernel
7.8
CVSSv3
CVE-2024-0646
An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the syst...
Linux Linux Kernel 6.7
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
6.1
CVSSv3
CVE-2022-39842
An issue exists in the Linux kernel prior to 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument...
Linux Linux Kernel 5.19
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
8.8
CVSSv3
CVE-2020-12351
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Linux Linux Kernel 5.9.0
Linux Linux Kernel
Linux Linux Kernel 5.9.1
1 Github repository
4.9
CVSSv3
CVE-2023-34324
Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. tr...
Xen Xen -
Linux Linux Kernel
7
CVSSv3
CVE-2023-46813
An issue exists in the Linux kernel prior to 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel m...
Linux Linux Kernel
1 Github repository
5.5
CVSSv3
CVE-2022-47946
An issue exists in the Linux kernel 5.10.x prior to 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an malicious user to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a proce...
Linux Linux Kernel
6.6
CVSSv3
CVE-2023-5197
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading pa...
Linux Linux Kernel
5.5
CVSSv3
CVE-2022-1204
A use-after-free flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.
Linux Linux Kernel
Linux Linux Kernel 5.17
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Debian Debian Linux 10.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »