Max CVSS | 7.2 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2018-18445 | 7.2 |
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bi
|
17-01-2023 - 21:34 | 17-10-2018 - 19:29 | |
CVE-2018-17972 | 4.9 |
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwindi
|
15-10-2020 - 13:28 | 03-10-2018 - 22:29 | |
CVE-2018-18281 | 4.6 |
Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain f
|
24-08-2020 - 17:37 | 30-10-2018 - 18:29 | |
CVE-2018-18955 | 4.4 |
In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected u
|
24-08-2020 - 17:37 | 16-11-2018 - 20:29 | |
CVE-2018-6559 | 2.1 |
The Linux kernel, as used in Ubuntu 18.04 LTS and Ubuntu 18.10, allows local users to obtain names of files in which they would not normally be able to access via an overlayfs mount inside of a user namespace.
|
09-10-2019 - 23:41 | 26-10-2018 - 17:29 | |
CVE-2018-18653 | 7.2 |
The Linux kernel, as used in Ubuntu 18.10 and when booted with UEFI Secure Boot enabled, allows privileged local users to bypass intended Secure Boot restrictions and execute untrusted code by loading arbitrary kernel modules. This occurs because a m
|
03-10-2019 - 00:03 | 26-10-2018 - 00:29 |