Show filters
153 Total Results
Displaying 21-30 of 153
Sort by:
Attacker Value
Unknown
SACK can cause extensive memory use via fragmented resend queue
Disclosure Date: June 19, 2019 (last updated February 28, 2024)
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
0
Attacker Value
Unknown
CVE-2018-20836
Disclosure Date: May 07, 2019 (last updated November 27, 2024)
An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
0
Attacker Value
Unknown
CVE-2019-3459
Disclosure Date: April 11, 2019 (last updated November 08, 2023)
A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.
0
Attacker Value
Unknown
CVE-2019-19927
Disclosure Date: February 28, 2019 (last updated November 27, 2024)
In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.
0
Attacker Value
Unknown
CVE-2019-9003
Disclosure Date: February 22, 2019 (last updated November 27, 2024)
In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
0
Attacker Value
Unknown
CVE-2018-20784
Disclosure Date: February 22, 2019 (last updated November 27, 2024)
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
0
Attacker Value
Unknown
CVE-2019-8912
Disclosure Date: February 18, 2019 (last updated November 27, 2024)
In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.
0
Attacker Value
Unknown
CVE-2017-2634
Disclosure Date: July 27, 2018 (last updated November 27, 2024)
It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
0
Attacker Value
Unknown
CVE-2017-15102
Disclosure Date: November 15, 2017 (last updated November 26, 2024)
The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference.
0
Attacker Value
Unknown
CVE-2017-1000111
Disclosure Date: October 05, 2017 (last updated November 26, 2024)
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.
0