Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 6.0 vulnerabilities and exploits
(subscribe to this query)
6
CVSSv3
CVE-2023-4394
A use-after-free flaw was found in btrfs_get_dev_args_from_path in fs/btrfs/volumes.c in btrfs file-system in the Linux Kernel. This flaw allows a local attacker with special privileges to cause a system crash or leak internal kernel information
Linux Linux Kernel
Linux Linux Kernel 6.0
5.5
CVSSv3
CVE-2022-3544
A vulnerability, which was classified as problematic, was found in Linux Kernel. Affected is the function damon_sysfs_add_target of the file mm/damon/sysfs.c of the component Netfilter. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. T...
Linux Linux Kernel 6.0
Linux Linux Kernel
5.5
CVSSv3
CVE-2022-4662
A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.
Linux Linux Kernel 6.0
Linux Linux Kernel
4.4
CVSSv3
CVE-2023-2860
An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated...
Linux Linux Kernel 6.0
Linux Linux Kernel
7.8
CVSSv3
CVE-2022-4095
A use-after-free flaw was found in Linux kernel prior to 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an malicious user to launch a local denial of service attack and gain escalation of privileges.
Linux Linux Kernel 6.0
Linux Linux Kernel
7.8
CVSSv3
CVE-2022-3910
Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased ...
Linux Linux Kernel 6.0
Linux Linux Kernel
5.5
CVSSv3
CVE-2022-3586
A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user ...
Linux Linux Kernel 6.0
Linux Linux Kernel
Debian Debian Linux 10.0
NA
CVE-2014-3940
The Linux kernel up to and including 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering a race condition ...
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 6.0
Linux Linux Kernel 3.14
Linux Linux Kernel 3.14.3
Linux Linux Kernel 3.14.4
Linux Linux Kernel
Linux Linux Kernel 3.14.1
Linux Linux Kernel 3.14.2
7.5
CVSSv3
CVE-2023-0122
A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an malicious user to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4.
Linux Linux Kernel 6.0
7.8
CVSSv3
CVE-2022-3170
An out-of-bounds access issue was found in the Linux kernel sound subsystem. It could occur when the 'id->name' provided by the user did not end with '\0'. A privileged local user could pass a specially crafted name through ioctl() interface and crash the s...
Linux Linux Kernel 6.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »