Max CVSS | 9.3 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2019-11599 | 6.9 |
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or p
|
15-02-2024 - 15:56 | 29-04-2019 - 18:29 | |
CVE-2019-10126 | 7.5 |
A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.
|
12-02-2023 - 23:32 | 14-06-2019 - 14:29 | |
CVE-2018-20836 | 9.3 |
An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
|
03-11-2022 - 02:22 | 07-05-2019 - 14:29 | |
CVE-2019-12817 | 6.9 |
arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of pow
|
18-04-2022 - 17:17 | 25-06-2019 - 12:15 | |
CVE-2019-10639 | 5.0 |
The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the
|
14-06-2021 - 18:15 | 05-07-2019 - 23:15 | |
CVE-2019-10638 | 4.3 |
In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to
|
14-06-2021 - 18:15 | 05-07-2019 - 23:15 | |
CVE-2019-12614 | 4.7 |
An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dere
|
25-02-2020 - 19:04 | 03-06-2019 - 22:29 | |
CVE-2019-13233 | 4.4 |
In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.
|
20-07-2019 - 12:15 | 04-07-2019 - 13:15 |