It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)
It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)
José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)
It was discovered that the io_uring subsystem in the Linux kernel contained
a use-after-free vulnerability. A local attacker could possibly use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2023-0469)
More Stories
linenoise-1.0-12.20200312git97d2850.fc42
FEDORA-2025-b83972992e Packages in this update: linenoise-1.0-12.20200312git97d2850.fc42 Update description: CVE-2025-9810 Read More
linenoise-1.0-9.20200312git97d2850.fc41
FEDORA-2025-cbe2e6c8ce Packages in this update: linenoise-1.0-9.20200312git97d2850.fc41 Update description: CVE-2025-9810 Read More
linenoise-1.0-3.20200312git97d2850.el9
FEDORA-EPEL-2025-e35c40aadd Packages in this update: linenoise-1.0-3.20200312git97d2850.el9 Update description: CVE-2025-9810 Read More
linenoise-1.0-2.20200312git97d2850.el8
FEDORA-EPEL-2025-8a558394ca Packages in this update: linenoise-1.0-2.20200312git97d2850.el8 Update description: CVE-2025-9810 Read More
webkitgtk-2.49.90-3.el10_1
FEDORA-EPEL-2025-bfa97edd0c Packages in this update: webkitgtk-2.49.90-3.el10_1 Update description: Fixup sources file Read More
buildah-1.41.4-1.fc43 containers-common-0.64.2-1.fc43 podman-5.6.1-1.fc43
FEDORA-2025-b93734b6b8 Packages in this update: buildah-1.41.4-1.fc43 containers-common-0.64.2-1.fc43 podman-5.6.1-1.fc43 Update description: Security fix for CVE-2025-9566 Automatic update for containers-common-0.64.2-1.fc43, buildah-1.41.4-1.fc43, podman-5.6.1-1.fc43....