Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 6.0 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2022-3170
An out-of-bounds access issue was found in the Linux kernel sound subsystem. It could occur when the 'id->name' provided by the user did not end with '\0'. A privileged local user could pass a specially crafted name through ioctl() interface and crash the s...
Linux Linux Kernel 6.0
4.4
CVSSv3
CVE-2022-42432
This vulnerability allows local malicious users to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The spec...
Linux Linux Kernel 6.0
5.5
CVSSv3
CVE-2022-2905
An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.
Linux Linux Kernel 6.0
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Debian Debian Linux 10.0
7.8
CVSSv3
CVE-2024-0562
A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi_unregister is called to stop further write-back and waits for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation work after this has completed, w...
Linux Linux Kernel
Linux Linux Kernel 6.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
4.7
CVSSv3
CVE-2022-3303
A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, ...
Linux Linux Kernel 6.0
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
6
CVSSv3
CVE-2020-10742
A flaw was found in the Linux kernel. An index buffer overflow during Direct IO write leading to the NFS client to crash. In some cases, a reach out of the index after one memory allocation by kmalloc will cause a kernel panic. The highest threat from this vulnerability is to dat...
Linux Linux Kernel -
Redhat Enterprise Linux 6.0
5.5
CVSSv3
CVE-2011-3637
The m_stop function in fs/proc/task_mmu.c in the Linux kernel prior to 2.6.39 allows local users to cause a denial of service (OOPS) via vectors that trigger an m_start error.
Linux Linux Kernel
Redhat Enterprise Linux 6.0
5.5
CVSSv3
CVE-2019-19338
A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions prior to 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA fl...
Linux Linux Kernel
Redhat Enterprise Linux 6.0
5.5
CVSSv3
CVE-2011-4097
Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel prior to 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Linux Linux Kernel
Redhat Enterprise Linux 6.0
6.1
CVSSv3
CVE-2019-3837
It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabl...
Linux Linux Kernel 2.6.32
Redhat Enterprise Linux 6.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »