CVE-2019-13272
- EPSS 81.07%
- Veröffentlicht 17.07.2019 13:15:10
- Zuletzt bearbeitet 06.11.2025 16:51:07
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with...
CVE-2019-10638
- EPSS 0.76%
- Veröffentlicht 05.07.2019 23:15:10
- Zuletzt bearbeitet 21.11.2024 04:19:38
In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to ...
CVE-2019-10639
- EPSS 1.05%
- Veröffentlicht 05.07.2019 23:15:10
- Zuletzt bearbeitet 21.11.2024 04:19:38
The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the...
CVE-2019-2024
- EPSS 0.08%
- Veröffentlicht 19.06.2019 21:15:10
- Zuletzt bearbeitet 21.11.2024 04:40:05
In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersi...
CVE-2019-11477
- EPSS 69.92%
- Veröffentlicht 19.06.2019 00:15:12
- Zuletzt bearbeitet 21.11.2024 04:21:09
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This ha...
CVE-2019-11478
- EPSS 29.76%
- Veröffentlicht 19.06.2019 00:15:12
- Zuletzt bearbeitet 21.11.2024 04:21:09
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denia...
CVE-2019-11479
- EPSS 13.36%
- Veröffentlicht 19.06.2019 00:15:12
- Zuletzt bearbeitet 21.11.2024 04:21:09
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial ...
CVE-2019-12881
- EPSS 0.39%
- Veröffentlicht 18.06.2019 23:15:10
- Zuletzt bearbeitet 21.11.2024 04:23:45
i915_gem_userptr_get_pages in drivers/gpu/drm/i915/i915_gem_userptr.c in the Linux kernel 4.15.0 on Ubuntu 18.04.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact via crafte...
CVE-2019-10126
- EPSS 2.86%
- Veröffentlicht 14.06.2019 14:29:00
- Zuletzt bearbeitet 21.11.2024 04:18:28
A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.
CVE-2019-12818
- EPSS 5.46%
- Veröffentlicht 14.06.2019 02:29:00
- Zuletzt bearbeitet 21.11.2024 04:23:38
An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of servi...