cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-1312,https://securityvulnerability.io/vulnerability/CVE-2024-1312,Use-After-Free Vulnerability in Linux Kernel Could Lead to System Crash,A use-after-free flaw was found in the Linux kernel's Memory Management subsystem when a user wins two races at the same time with a fail in the mas_prev_slot function. This issue could allow a local user to crash the system.,Red Hat,"kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",4.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-02-08T12:38:03.062Z,0 CVE-2024-0564,https://securityvulnerability.io/vulnerability/CVE-2024-0564,Kernel: max page sharing of kernel samepage merging (ksm) may cause memory deduplication,"A flaw was found in the Linux kernel's memory deduplication mechanism. The max page sharing of Kernel Samepage Merging (KSM), added in Linux kernel version 4.4.0-96.119, can create a side channel. When the attacker and the victim share the same host and the default setting of KSM is ""max page sharing=256"", it is possible for the attacker to time the unmap to merge with the victim's page. The unmapping time depends on whether it merges with the victim's page and additional physical pages are created beyond the KSM's ""max page share"". Through these operations, the attacker can leak the victim's page.",Red Hat,"kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",6.5,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-01-30T15:01:08.057Z,0 CVE-2023-6200,https://securityvulnerability.io/vulnerability/CVE-2023-6200,Unauthenticated Attacker Could Execute Arbitrary Code via ICMPv6 Router Advertisement Packet,"A race condition has been identified in the Linux Kernel, which can be exploited under specific conditions. An unauthenticated attacker situated within an adjacent network may exploit this vulnerability by sending crafted ICMPv6 router advertisement packets. If successful, this attack could lead to arbitrary code execution, potentially compromising the integrity and security of the affected systems.",Red Hat,"kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Virtualization 4,Fedora",7.5,HIGH,0.004679999779909849,false,false,false,false,,false,false,2024-01-28T12:19:24.885Z,0 CVE-2024-0775,https://securityvulnerability.io/vulnerability/CVE-2024-0775,Kernel: use-after-free while changing the mount option in __ext4_remount leading,"A use-after-free vulnerability exists in the ext4 file system within the Linux kernel. This flaw occurs due to improper handling of old quota file names, which can lead to inactive memory being accessed during a failure condition. A local user could exploit this issue to potentially leak sensitive information or impact system stability through unintended access to freed memory regions. The vulnerability resides specifically in the __ext4_remount function located in fs/ext4/super.c, making it crucial for system administrators to monitor and patch affected systems promptly to mitigate risks.",Red Hat,"Kernel,kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",7.1,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2024-01-22T13:03:09.603Z,0 CVE-2024-0607,https://securityvulnerability.io/vulnerability/CVE-2024-0607,Kernel: nf_tables: pointer math issue in nft_byteorder_eval(),"A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.",Red Hat,"Kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",6.6,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-18T15:41:14.425Z,0 CVE-2024-0646,https://securityvulnerability.io/vulnerability/CVE-2024-0646,Kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination,"The vulnerability arises from an out-of-bounds memory write flaw in the Linux kernel's Transport Layer Security (TLS) functionality, specifically during a user-initiated call to the splice function with a ktls socket as its destination. This flaw potentially allows a local user to crash the system or escalate their privileges, posing significant security risks to systems utilizing affected versions of the Linux kernel.",Red Hat,"Kernel,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8.2 Advanced Update Support,Red Hat Enterprise Linux 8.2 Telecommunications Update Service,Red Hat Enterprise Linux 8.2 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.4 Telecommunications Update Service,Red Hat Enterprise Linux 8.4 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.6 Extended Update Support,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Extended Update Support,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Virtualization 4 For Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Fedora",7.8,HIGH,0.0004400000034365803,false,true,false,false,,false,false,2024-01-17T15:16:45.148Z,0 CVE-2024-0641,https://securityvulnerability.io/vulnerability/CVE-2024-0641,Kernel: deadlock leading to denial of service in tipc_crypto_key_revoke,A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel’s TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.,Red Hat,"Kernel,kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-17T15:15:45.272Z,0 CVE-2024-0639,https://securityvulnerability.io/vulnerability/CVE-2024-0639,Kernel: potential deadlock on &net->sctp.addr_wq_lock leading to dos,A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.,Red Hat,"Kernel,kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-17T15:14:47.088Z,0 CVE-2024-0582,https://securityvulnerability.io/vulnerability/CVE-2024-0582,Memory Leak Flaw in Linux Kernel's io_uring Could Lead to Privilege Escalation,"A memory leak flaw exists in the io_uring functionality of the Linux kernel. The vulnerability arises in the process of user registration of a buffer ring via the IORING_REGISTER_PBUF_RING method, which, upon mmapping and subsequent freeing of the buffer, fails to properly release allocated memory. This oversight could enable a local user to not only crash the affected system but also create an opportunity for privilege escalation. The implications of this vulnerability underscore the need for prompt attention and remediation to secure the integrity of systems utilizing the Linux kernel.",Red Hat,"kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",7.8,HIGH,0.0004199999966658652,false,true,false,true,true,true,false,2024-01-16T14:33:44.744Z,6391 CVE-2024-0565,https://securityvulnerability.io/vulnerability/CVE-2024-0565,Kernel: cifs filesystem decryption improper input validation remote code execution vulnerability in function receive_encrypted_standard of client,"A vulnerability has been identified in the Linux Kernel's SMB Client component, specifically within the receive_encrypted_standard function. This flaw arises from an integer underflow during memory copying operations, leading to an out-of-bounds memory read scenario. Exploitation of this issue could cause systems to experience a denial of service, rendering them temporarily inoperable. System administrators are advised to apply the necessary patches to secure their environments and prevent potential disruptions.",Red Hat,"Kernel,Kernel,Red Hat Enterprise Linux 8.6 Extended Update Support,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Virtualization 4 For Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",7.4,HIGH,0.0038300000596791506,false,false,false,false,,false,false,2024-01-15T20:02:02.639Z,0 CVE-2024-0562,https://securityvulnerability.io/vulnerability/CVE-2024-0562,Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c,"A use-after-free flaw exists within the Linux Kernel, particularly triggered during the removal of a disk. This issue occurs when the bdi_unregister function is invoked to halt write-back processes, while still waiting for associated delayed work completion. Consequently, the wb_inode_writeback_end function might schedule bandwidth estimation tasks post-completion, leading to scenarios where a timer attempts to interact with bdi_writeback that has already been freed. This oversight poses risks for system stability and may negatively impact performance.",Red Hat,"kernel,Red Hat Enterprise Linux 8.6 Extended Update Support,Red Hat Virtualization 4 for Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2024-01-15T19:01:36.947Z,0 CVE-2024-0443,https://securityvulnerability.io/vulnerability/CVE-2024-0443,Kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline.,"A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is called when the blkcg reference count reaches 0. This circular dependency will prevent blkcg and some blkgs from being freed after they are made offline. This issue may allow an attacker with a local access to cause system instability, such as an out of memory error.",Red Hat,"kernel,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 9,Fedora",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-12T00:15:00.000Z,0 CVE-2023-6476,https://securityvulnerability.io/vulnerability/CVE-2023-6476,Cri-o: pods are able to break out of resource confinement on cgroupv2,"A critical flaw exists in the CRI-O runtime, which is related to experimental annotations that can lead to a container running in an unconfined state. This vulnerability allows a pod to gain control over memory and CPU resources beyond standard limits, effectively bypassing the Kubernetes scheduler's resource management. The repercussions of this vulnerability could include a denial of service on the affected node, as it can lead to resource exhaustion and instability. Monitoring and patching affected versions are essential to mitigate risks associated with this vulnerability.",Red Hat,"kernel,Red Hat OpenShift Container Platform 4.13,Red Hat OpenShift Container Platform 4.14,Red Hat OpenShift Container Platform 3.11,Fedora,Extra Packages for Enterprise Linux",7.5,HIGH,0.0006900000153109431,false,false,false,false,,false,false,2024-01-09T21:32:03.407Z,0 CVE-2024-0340,https://securityvulnerability.io/vulnerability/CVE-2024-0340,Kernel: information disclosure in vhost/vhost.c:vhost_new_msg(),"A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",Red Hat,"kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-09T18:15:00.000Z,0 CVE-2024-0193,https://securityvulnerability.io/vulnerability/CVE-2024-0193,Use-After-Free Vulnerability in Linux Kernel's Netfilter Subsystem,"The article discusses a critical use-after-free vulnerability in the netfilter subsystem of the Linux kernel, which can potentially allow local, unprivileged users with CAP_NET_ADMIN capability to escalate their privileges. The flaw was identified in the upstream commit 5f68718b34a5, and Red Hat confirmed that it does not affect any shipped kernel releases of Red Hat Enterprise Linux (RHEL) 6, 7, and 8, but it does affect the OpenShift Container Platform (OCP) based on Red Hat Enterprise Linux CoreOS (RHCOS). Mitigation strategies include controlling the ability to create user/net namespaces, but for containerized deployments, the functionality needs to remain enabled. The impact on Red Hat Enterprise Linux and OpenShift environments is limited due to existing permissions and namespace configurations, but administrators are advised to implement the recommended mitigations to safeguard their systems against potential exploitation.",Red Hat,"Kernel,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Fedora",6.7,MEDIUM,0.0004199999966658652,false,true,false,true,,false,false,2024-01-02T18:15:00.000Z,0 CVE-2023-6679,https://securityvulnerability.io/vulnerability/CVE-2023-6679,Kernel: null pointer dereference in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c,A null pointer dereference vulnerability was found in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c in the Digital Phase Locked Loop (DPLL) subsystem in the Linux kernel. This issue could be exploited to trigger a denial of service.,Red Hat,"kernel,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Fedora",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-12-11T19:15:00.000Z,0 CVE-2023-6560,https://securityvulnerability.io/vulnerability/CVE-2023-6560,Kernel: io_uring out of boundary memory access in __io_uaddr_map(),An out-of-bounds memory access flaw was found in the io_uring SQ/CQ rings functionality in the Linux kernel. This issue could allow a local user to crash the system.,Red Hat,"kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-12-09T00:15:00.000Z,0 CVE-2023-5972,https://securityvulnerability.io/vulnerability/CVE-2023-5972,Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c,"A vulnerability exists in the nft_inner.c functionality of the netfilter component of the Linux kernel, where a null pointer dereference could potentially allow a local user to crash the system. This flaw presents a risk of privilege escalation, enabling users to execute unauthorized actions within the system, thereby compromising security and stability. It is crucial for system administrators to apply relevant patches and updates to mitigate this risk.",Red Hat,"Kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2023-11-23T18:15:00.000Z,0 CVE-2023-6238,https://securityvulnerability.io/vulnerability/CVE-2023-6238,Kernel: nvme: memory corruption via unprivileged user passthrough,"A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption.",Red Hat,"Kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",6.7,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2023-11-21T21:15:00.000Z,0 CVE-2023-6039,https://securityvulnerability.io/vulnerability/CVE-2023-6039,Kernel: use-after-free in drivers/net/usb/lan78xx.c in lan78xx_disconnect,"A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.",Red Hat,"Kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-11-09T15:15:00.000Z,0 CVE-2023-1476,https://securityvulnerability.io/vulnerability/CVE-2023-1476,Incomplete fix for cve-2022-41222,"A use-after-free flaw in the Linux kernel’s memory management component poses risks due to a race condition between the reverse mapping walk and the mremap function. This vulnerability may allow a local user to disrupt system functionality, leading to potential crashes or elevation of privileges on affected systems, highlighting the importance of timely updates and patches.",Red Hat,"Kernel,Red Hat Enterprise Linux 8",7,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2023-11-03T09:15:00.000Z,0 CVE-2023-1194,https://securityvulnerability.io/vulnerability/CVE-2023-1194,Use-after-free in parse_lease_state(),"A flaw exists in the KSMBD implementation of the in-kernel Samba server, where an out-of-bounds memory read can occur due to inadequate validation of input data. This vulnerability allows an attacker to exploit the `parse_lease_state` function by sending a malformed CREATE command, resulting in unauthorized access to invalid memory. This flaw poses significant security risks for systems relying on KSMBD for CIFS functionality, and immediate attention to patching and mitigation is advised.",Red Hat,"kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",8.1,HIGH,0.0011099999537691474,false,false,false,false,,false,false,2023-11-03T08:15:00.000Z,0 CVE-2023-1193,https://securityvulnerability.io/vulnerability/CVE-2023-1193,Use-after-free in setup_async_work(),A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. This issue could allow an attacker to crash the system by accessing freed work.,Red Hat,"Kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",6.5,MEDIUM,0.0007099999929778278,false,false,false,false,,false,false,2023-11-01T20:15:00.000Z,0 CVE-2023-1192,https://securityvulnerability.io/vulnerability/CVE-2023-1192,Use-after-free in smb2_is_status_io_timeout(),"A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.",Red Hat,"Kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",6.5,MEDIUM,0.0005600000149570405,false,false,false,false,,false,false,2023-11-01T20:15:00.000Z,0 CVE-2023-42752,https://securityvulnerability.io/vulnerability/CVE-2023-42752,Integer overflow in igmpv3_newpack leading to exploitable memory access,"An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.",Red Hat,"Kernel,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-10-13T02:15:00.000Z,0