It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)
It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)
José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)
It was discovered that the io_uring subsystem in the Linux kernel contained
a use-after-free vulnerability. A local attacker could possibly use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2023-0469)
More Stories
perl-Plack-Middleware-Session-0.36-1.fc42
FEDORA-2025-ca07c36a0a Packages in this update: perl-Plack-Middleware-Session-0.36-1.fc42 Update description: This update upgrade the package to version 0.36. This version fixes CVE-2025-40923...
perl-Catalyst-Plugin-Session-0.44-1.fc42
FEDORA-2025-90d5989bee Packages in this update: perl-Catalyst-Plugin-Session-0.44-1.fc42 Update description: This update upgrade the package to version 0.44. This version fixes CVE-2025-40924...
perl-Catalyst-Authentication-Credential-HTTP-1.019-1.fc42
FEDORA-2025-d72429a1f8 Packages in this update: perl-Catalyst-Authentication-Credential-HTTP-1.019-1.fc42 Update description: This update upgrade the package to version 1.019. This version fixes CVE-2025-40920...
DSA-5994-1 shibboleth-sp – security update
Florian Stuhlmann discovered a SQL vulnerability in the ODBC plugin in the Shibboleth Service Provider which may result in information...
libopenmpt-0.8.3-1.el10_0
FEDORA-EPEL-2025-dc43510de4 Packages in this update: libopenmpt-0.8.3-1.el10_0 Update description: libopenmpt 0.8.3 (2025-09-06) [Bug] libopenmpt is now compatible with most non-standard builds...
libopenmpt-0.8.3-1.el10_2
FEDORA-EPEL-2025-3f414a0955 Packages in this update: libopenmpt-0.8.3-1.el10_2 Update description: libopenmpt 0.8.3 (2025-09-06) [Bug] libopenmpt is now compatible with most non-standard builds...