Known Vulnerabilities for Linux Kernel by Linux

Listed below are 10 of the newest known vulnerabilities associated with "Linux Kernel" by "Linux".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2023-34256 ** DISPUTED ** An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16... Not Provided 2023-05-31 2023-06-05
CVE-2023-33288 An issue was discovered in the Linux kernel before 6.2.9. A use-after-free was found in bq24190_remove in drivers/power/suppl... Not Provided 2023-05-22 2023-05-22
CVE-2023-33250 The Linux kernel 6.3 has a use-after-free in iopt_unmap_iova_range in drivers/iommu/iommufd/io_pagetable.c. Not Provided 2023-05-21 2023-05-21
CVE-2023-33203 The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c ... Not Provided 2023-05-18 2023-05-23
CVE-2023-32269 An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accep... Not Provided 2023-05-05 2023-05-05
CVE-2023-32233 In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to pe... Not Provided 2023-05-08 2023-05-15
CVE-2023-31436 qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exce... Not Provided 2023-04-28 2023-05-14
CVE-2023-31085 An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->... Not Provided 2023-04-24 2023-04-24
CVE-2023-31084 An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when ... Not Provided 2023-04-24 2023-04-24
CVE-2023-31083 An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race cond... Not Provided 2023-04-24 2023-04-24

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
LinuxLinux Kernel5.9.9AllAllAll
Operating
System
LinuxLinux Kernel5.9.7AllAllAll
Operating
System
LinuxLinux Kernel5.9.3AllAllAll
Operating
System
LinuxLinux Kernel5.9.2AllAllAll
Operating
System
LinuxLinux Kernel5.9.13AllAllAll
Operating
System
LinuxLinux Kernel5.9.1AllAllAll
Operating
System
LinuxLinux Kernel5.9.0-AllAll
Operating
System
LinuxLinux Kernel5.9.0rc1AllAll
Operating
System
LinuxLinux Kernel5.9.0rc2AllAll
Operating
System
LinuxLinux Kernel5.9.0rc3AllAll
Operating
System
LinuxLinux Kernel5.9.0rc4AllAll
Operating
System
LinuxLinux Kernel5.9.0rc5AllAll
Operating
System
LinuxLinux Kernel5.9.0rc6AllAll
Operating
System
LinuxLinux Kernel5.8.9AllAllAll
Operating
System
LinuxLinux Kernel5.8.8AllAllAll
Operating
System
LinuxLinux Kernel5.8.7AllAllAll
Operating
System
LinuxLinux Kernel5.8.6AllAllAll
Operating
System
LinuxLinux Kernel5.8.5AllAllAll
Operating
System
LinuxLinux Kernel5.8.4AllAllAll
Operating
System
LinuxLinux Kernel5.8.3AllAllAll

Popular searches for Linux Kernel


University of Minnesota banned from contributing to Linux kernel

www.theverge.com/2021/4/22/22398156/university-minnesota-linux-kernal-ban-research

D @University of Minnesota banned from contributing to Linux kernel University of Minnesota banned from contributing to Linux kernel - The Verge Email Illustration by Alex Castro / The Verge The University of Minnesota has been banned from contributing to the Linux kernel by one of its maintainers after researchers from the school apparently knowingly submitted code with security flaws. Earlier this year, two researchers from the university released a paper detailing how they had submitted known security vulnerabilities to the Linux kernel in order to show how potentially malicious code could get through the approval process. Now, after another student from the university submitted code that reportedly does nothing, kernel maintainer and Linux Foundation fellow Greg Kroah-Hartman has released a statement calling for all kernel maintainers to reject any code submissions from anyone using a umn.edu email address. In addition to not accepting any new code from the university, all of the code submitted in the past is being removed and re-reviewed. It seems like it will be a massive amount of work, but Kroah-Hartman has made it clear that the developer community doesnt appreciate being experimented on and that all of the code from the university has been called into question due to the research. The possibility of bugs slipping through is well-known in the open-source software community The university has put out a statement, saying its been made aware of the research and its subsequent ban from contributing. It says it has suspended that line of research and will be investigating how the study was approved and carried out. In a statement meant to clarify the study, the researchers said they intended to bring attention to issues with the submission process mainly, the fact that bugs, including ones that were potentially maliciously crafted, could slip through. Kernel developer Laura Abbot countered this in a blog post, saying that the possibility of bugs slipping through is well-known in the open-source software community. In what appears to be a private message, the person who submitted the reportedly nonfunctional code called Kroah-Hartmans accusations that the code was known to be invalid wild and bordering on slander. Its unclear if that submission which kicked off the current controversy was actually part of a research project. The person who submitted it did so with their umn.edu email address, while the patches submitted in the study were done through random Gmail addresses, and the submitter claimed that the faulty code was created by a tool. Kroah-Hartmans response basically said that he found it unlikely that a tool had created the code, and, given the research, he couldnt trust that the patch was made in good faith either way. Theres been criticism from some in the open-source community, saying that Kroah-Hartman deciding to pull any patches submitted by U of M personal is an overreaction, which could lead to bugs fixed by legitimate patches being reintroduced. It is worth noting, however, that the plan is to re-review the patches and to resubmit them if theyre found to be valid. Next Up In Policy Sign up for the newsletter Verge Deals Subscribe to get the best Verge-approved tech deals of the week. Email required By signing up, you agree to our Privacy Notice and European users agree to the data transfer policy. Loading comments...

Linux kernel The Verge University of Minnesota Source code Software bug Patch (computing) Kernel (operating system) Vulnerability (computing) Research Email Email address Open-source software Software maintainer Malware Programmer

Linux.org

www.linux.org

Linux.org Friendly Linux Forum

www.weblio.jp/redirect?etd=fbc3555661e192f4&url=http%3A%2F%2Fwww.linux.org%2F lugip.org www.lugip.org Linux Software Installation (computer programs) CentOS Exhibition game Calibre (software) Application software Internet forum Log file E-book APT (software) Ubuntu Glossary of video game terms Software repository Command (computing) Cross-platform software Data storage Computer program Pre-installed software Go (programming language)

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report