Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kernel-rt vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2023-4207
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This c...
Linux Linux Kernel
Debian Debian Linux 12.0
7.8
CVSSv3
CVE-2023-4208
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This...
Linux Linux Kernel
Debian Debian Linux 12.0
6.5
CVSSv3
CVE-2022-40982
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Redhat Enterprise Linux 7.0
Xen Xen -
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Intel Microcode
Intel Xeon E-2314 Firmware -
Intel Xeon E-2324g Firmware -
Intel Xeon E-2334 Firmware -
Intel Xeon E-2374g Firmware -
Intel Xeon E-2336 Firmware -
Intel Xeon E-2356g Firmware -
Intel Xeon E-2386g Firmware -
Intel Xeon E-2378 Firmware -
Intel Xeon E-2378g Firmware -
Intel Xeon E-2388g Firmware -
Intel Xeon W-1350 Firmware -
Intel Xeon W-1350p Firmware -
Intel Xeon W-1370 Firmware -
Intel Xeon W-1370p Firmware -
Intel Xeon W-1390t Firmware -
Intel Xeon W-1390 Firmware -
2 Github repositories
2 Articles
NA
CVE-2023-4128
Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 ...
4.7
CVSSv3
CVE-2023-20569
A side channel vulnerability on some of the AMD CPUs may allow an malicious user to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Amd Ryzen 9 5950x Firmware
Amd Ryzen 9 5900x Firmware
Amd Ryzen 9 5900 Firmware
Amd Ryzen 9 Pro 5945 Firmware
Amd Ryzen 7 5800x3d Firmware
Amd Ryzen 7 5800x Firmware
Amd Ryzen 7 5800 Firmware
Amd Ryzen 7 5700x Firmware
Amd Ryzen 7 Pro 5845 Firmware
Amd Ryzen 5 5600x3d Firmware
Amd Ryzen 5 5600x Firmware
Amd Ryzen 5 5600 Firmware
Amd Ryzen 5 Pro 5645 Firmware
Amd Ryzen 7 5700 Firmware
Amd Ryzen 5 5500 Firmware
Amd Ryzen 3 5100 Firmware
Amd Ryzen 7 5700g Firmware
1 Article
7.8
CVSSv3
CVE-2023-4147
A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
Linux Linux Kernel 6.5
Linux Linux Kernel
Fedoraproject Fedora 38
Redhat Enterprise Linux 9.0
Redhat Enterprise Linux For Real Time For Nfv 9.0
Redhat Enterprise Linux For Real Time 9.0
Redhat Enterprise Linux Server Aus 9.2
Redhat Enterprise Linux Eus 9.2
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
7.8
CVSSv3
CVE-2023-4004
A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the ...
Linux Linux Kernel
Fedoraproject Fedora 38
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Netapp H300s -
Netapp H500s -
Netapp H700s -
Netapp H410s -
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
5.5
CVSSv3
CVE-2023-20593
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an malicious user to potentially access sensitive information.
Xen Xen 4.15.0
Xen Xen 4.17.0
Xen Xen 4.16.0
Xen Xen 4.14.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Amd Ryzen 3 3100 Firmware -
Amd Ryzen 3 3300x Firmware -
Amd Ryzen 5 3500 Firmware -
Amd Ryzen 5 3500x Firmware -
Amd Ryzen 5 3600 Firmware -
Amd Ryzen 5 3600x Firmware -
Amd Ryzen 5 3600xt Firmware -
Amd Ryzen 7 3700x Firmware -
Amd Ryzen 7 3800x Firmware -
Amd Ryzen 7 3800xt Firmware -
Amd Ryzen 9 3900 Firmware -
Amd Ryzen 9 3900x Firmware -
Amd Ryzen 9 3900xt Firmware -
Amd Ryzen 9 3950x Firmware -
Amd Ryzen 9 Pro 3900 Firmware -
2 Github repositories
1 Article
7.8
CVSSv3
CVE-2023-3812
An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privilege...
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
7.8
CVSSv3
CVE-2023-3609
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in...
Linux Linux Kernel 6.4
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »