Known Vulnerabilities for Linux Kernel-rt by Linux

Listed below are 1 of the newest known vulnerabilities associated with "Linux Kernel-rt" by "Linux".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2023-28772 An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow. Not Provided 2023-03-23 2023-03-23
CVE-2023-28466 do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition... Not Provided 2023-03-16 2023-03-16
CVE-2023-28339 OpenDoas through 6.8.2, when TIOCSTI is available, allows privilege escalation because of sharing a terminal with the origina... Not Provided 2023-03-14 2023-03-14
CVE-2023-26607 In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c. Not Provided 2023-02-26 2023-03-16
CVE-2023-26606 In the Linux kernel 6.0.8, there is a use-after-free in ntfs_trim_fs in fs/ntfs3/bitmap.c. Not Provided 2023-02-26 2023-03-16
CVE-2023-26605 In the Linux kernel 6.0.8, there is a use-after-free in inode_cgwb_move_to_attached in fs/fs-writeback.c, related to __list_d... Not Provided 2023-02-26 2023-03-16
CVE-2023-26545 In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering t... Not Provided 2023-02-25 2023-03-16
CVE-2023-26544 In the Linux kernel 6.0.8, there is a use-after-free in run_unpack in fs/ntfs3/run.c, related to a difference between NTFS se... Not Provided 2023-02-25 2023-03-16
CVE-2023-26242 afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the Linux kernel through 6.1.12 has an integer overflow. Not Provided 2023-02-21 2023-02-21
CVE-2023-25012 The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device b... Not Provided 2023-02-02 2023-02-02

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
LinuxLinux Kernel-rt3.10.0AllAllAll

Popular searches for Linux Kernel-rt

Linux.org

www.linux.org

Linux.org Friendly Linux Forum

www.weblio.jp/redirect?etd=fbc3555661e192f4&url=http%3A%2F%2Fwww.linux.org%2F lugip.org www.lugip.org Linux Software Installation (computer programs) CentOS Exhibition game Application software Internet forum Calibre (software) Ubuntu Log file E-book APT (software) Glossary of video game terms Software repository Command (computing) Cross-platform software Data storage Pre-installed software Go (programming language) Data conversion

Linux kernel - Wikipedia

en.wikipedia.org/wiki/Linux_kernel

Linux kernel - Wikipedia The Linux Unix-like operating system kernel. It was conceived and created in 1991 by Linus Torvalds for his i386-based PC, and it was soon adopted as the kernel for the GNU operating system, which was created as a free replacement for UNIX. Since then, it has spawned a plethora of operating system distributions, commonly also called Linux

en.m.wikipedia.org/wiki/Linux_kernel en.wikipedia.org/wiki/Linux_Kernel en.wikipedia.org/wiki/Linux_(kernel) en.wikipedia.org/wiki/Vanilla_kernel en.wikipedia.org/wiki/Iphone_linux en.wikipedia.org/wiki/Vmsplice()_local_root_exploit en.wikipedia.org/wiki.phtml?title=Linux_kernel en.m.wikipedia.org/wiki/Linux_kernel_preemption Linux kernel Kernel (operating system) Linux Operating system Free software Wikipedia Linus Torvalds GNU Source code Unix GNU General Public License Personal computer Linux distribution Modular programming User space Intel 80386 Patch (computing) Monolithic kernel Software versioning Computer multitasking

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report