Show filters
62 Total Results
Displaying 11-20 of 62
Sort by:
Attacker Value
Unknown
CVE-2019-20054
Disclosure Date: December 28, 2019 (last updated November 27, 2024)
In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.
0
Attacker Value
Unknown
CVE-2019-19965
Disclosure Date: December 25, 2019 (last updated November 27, 2024)
In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.
0
Attacker Value
Unknown
CVE-2019-19966
Disclosure Date: December 25, 2019 (last updated November 27, 2024)
In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.
0
Attacker Value
Unknown
CVE-2019-19947
Disclosure Date: December 24, 2019 (last updated November 27, 2024)
In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c driver, aka CID-da2311a6385c.
0
Attacker Value
Unknown
CVE-2019-5108
Disclosure Date: December 23, 2019 (last updated November 27, 2024)
An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2019-19922
Disclosure Date: December 22, 2019 (last updated November 27, 2024)
kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)
0
Attacker Value
Unknown
CVE-2019-19813
Disclosure Date: December 17, 2019 (last updated November 27, 2024)
In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in __mutex_lock in kernel/locking/mutex.c. This is related to mutex_can_spin_on_owner in kernel/locking/mutex.c, __btrfs_qgroup_free_meta in fs/btrfs/qgroup.c, and btrfs_insert_delayed_items in fs/btrfs/delayed-inode.c.
0
Attacker Value
Unknown
CVE-2019-19816
Disclosure Date: December 17, 2019 (last updated November 27, 2024)
In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image and performing some operations can cause slab-out-of-bounds write access in __btrfs_map_block in fs/btrfs/volumes.c, because a value of 1 for the number of data stripes is mishandled.
0
Attacker Value
Unknown
CVE-2019-19448
Disclosure Date: December 08, 2019 (last updated November 27, 2024)
In the Linux kernel 5.0.21 and 5.3.11, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in fs/btrfs/free-space-cache.c because the pointer to a left data structure can be the same as the pointer to a right data structure.
0
Attacker Value
Unknown
CVE-2019-19447
Disclosure Date: December 08, 2019 (last updated November 27, 2024)
In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.
0