Known vulnerabilities in Linux Foundation Linux kernel 5.15.173 - page 8

Website: https://www.linuxfoundation.org
Total Security Bulletins: 214

Security bulletins (214)

Secuity bulletin Severity Status Published
SB2024112044: Improper locking in Linux kernel ipv4 Low
Patched
20.11.2024
SB2024111954: Resource management error in Linux kernel arm64 kernel Low
Patched
19.11.2024
SB2024111951: Infinite loop in Linux kernel mm Low
Patched
19.11.2024
SB2024111926: Use-after-free in Linux kernel smb server Low
Patched
19.11.2024
SB2024111925: Use-after-free in Linux kernel md driver Low
Patched
19.11.2024
SB2024111051: Input validation error in Linux kernel ntfs3 Low
Patched
10.11.2024
SB2024111041: Integer underflow in Linux kernel nfsd Low
Patched
10.11.2024
SB2024111033: Input validation error in Linux kernel core Low
Patched
10.11.2024
SB20241105107: Input validation error in Linux kernel unicode Low
Patched
05.11.2024
SB2024110564: Use-after-free in Linux kernel net bluetooth Low
Patched
05.11.2024
SB2024110562: Use-after-free in Linux kernel nfsd Low
Patched
05.11.2024
SB20241022339: Input validation error in Linux kernel crypto hisilicon driver Low
Patched
22.10.2024
SB20241022332: Input validation error in Linux kernel nfsd Low
Patched
22.10.2024
SB20241022310: Improper locking in Linux kernel f2fs Low
Patched
22.10.2024
SB20241022213: Buffer overflow in Linux kernel smb client Low
Patched
22.10.2024
SB20241022170: Double free in Linux kernel dc link driver Low
Patched
22.10.2024
SB20241022169: Double free in Linux kernel base driver Low
Patched
22.10.2024
SB20241022107: Improper locking in Linux kernel smb client Low
Patched
22.10.2024
SB20241022100: NULL pointer dereference in Linux kernel ipv6 Low
Patched
22.10.2024
SB2024102256: NULL pointer dereference in Linux kernel dsa Low
Patched
22.10.2024


Showing elements 141 - 160 out of 214