Show filters
113 Total Results
Displaying 51-60 of 113
Sort by:
Attacker Value
Unknown

CVE-2018-10938

Disclosure Date: August 27, 2018 (last updated November 27, 2024)
A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.
0
Attacker Value
Unknown

CVE-2018-7754

Disclosure Date: August 10, 2018 (last updated November 27, 2024)
The aoedisk_debugfs_show function in drivers/block/aoe/aoeblk.c in the Linux kernel through 4.16.4rc4 allows local users to obtain sensitive address information by reading "ffree: " lines in a debugfs file.
0
Attacker Value
Unknown

CVE-2018-5390

Disclosure Date: August 06, 2018 (last updated November 08, 2023)
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
Attacker Value
Unknown

CVE-2018-10877

Disclosure Date: July 18, 2018 (last updated November 27, 2024)
Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.
0
Attacker Value
Unknown

CVE-2016-9604

Disclosure Date: July 11, 2018 (last updated November 08, 2023)
It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.
0
Attacker Value
Unknown

CVE-2018-12929

Disclosure Date: June 28, 2018 (last updated November 26, 2024)
ntfs_read_locked_inode in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a use-after-free read and possibly cause a denial of service (kernel oops or panic) via a crafted ntfs filesystem.
0
Attacker Value
Unknown

CVE-2018-12928

Disclosure Date: June 28, 2018 (last updated November 26, 2024)
In the Linux kernel 4.15.0, a NULL pointer dereference was discovered in hfs_ext_read_extent in hfs.ko. This can occur during a mount of a crafted hfs filesystem.
0
Attacker Value
Unknown

CVE-2018-12930

Disclosure Date: June 28, 2018 (last updated November 26, 2024)
ntfs_end_buffer_async_read in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a stack-based out-of-bounds write and cause a denial of service (kernel oops or panic) or possibly have unspecified other impact via a crafted ntfs filesystem.
0
Attacker Value
Unknown

CVE-2018-12931

Disclosure Date: June 28, 2018 (last updated November 26, 2024)
ntfs_attr_find in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a stack-based out-of-bounds write and cause a denial of service (kernel oops or panic) or possibly have unspecified other impact via a crafted ntfs filesystem.
0
Attacker Value
Unknown

CVE-2018-1000200

Disclosure Date: June 05, 2018 (last updated November 26, 2024)
The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process's final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously with the oom reaper's unmap_page_range() since the vma's VM_LOCKED bit is cleared before munlocking (to determine if any other vmas share the memory and are mlocked).
0