The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Google Android Jelly Bean

Linux kernel: information disclosure via crng_ready
An attacker can bypass access restrictions to data via crng_ready() of the Linux kernel, in order to obtain sensitive information...
1559, CERTFR-2018-AVI-408, CERTFR-2018-AVI-413, CVE-2018-1108, DSA-4188-1, FEDORA-2018-884a105c04, FEDORA-2018-bb7aab12cb, openSUSE-SU-2018:2119-1, USN-3752-1, USN-3752-2, USN-3752-3, VIGILANCE-VUL-25957
Linux kernel: out-of-bounds memory reading via Keyring Subsystem
An attacker can force a read at an invalid address via Keyring Subsystem of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
CERTFR-2018-AVI-198, CERTFR-2018-AVI-250, CERTFR-2018-AVI-299, CERTFR-2018-AVI-308, CERTFR-2018-AVI-319, CERTFR-2018-AVI-330, CERTFR-2018-AVI-392, CERTFR-2018-AVI-426, CVE-2017-13305, DLA-1731-1, DLA-1731-2, openSUSE-SU-2018:1773-1, RHSA-2018:2165-01, SUSE-SU-2018:1761-1, SUSE-SU-2018:1762-1, SUSE-SU-2018:1816-1, SUSE-SU-2018:1855-1, SUSE-SU-2018:2332-1, SUSE-SU-2018:2366-1, SUSE-SU-2018:2637-1, USN-3631-1, USN-3631-2, USN-3655-1, USN-3655-2, VIGILANCE-VUL-25956
OpenCV: assertion error via cv-RBaseStream-setPos
An attacker can force an assertion error via cv::RBaseStream::setPos() of OpenCV, in order to trigger a denial of service...
CVE-2018-5269, DLA-1354-1, DLA-1438-1, openSUSE-SU-2018:1438-1, VIGILANCE-VUL-25928
OpenCV: buffer overflow via cv-Jpeg2KDecoder-readComponent8u
An attacker can generate a buffer overflow via cv::Jpeg2KDecoder::readComponent8u() of OpenCV, in order to trigger a denial of service, and possibly to run code...
CVE-2018-5268, DLA-1354-1, DLA-1438-1, openSUSE-SU-2018:1438-1, VIGILANCE-VUL-25927
Linux kernel: memory corruption via DMA Allocation
An attacker can generate a memory corruption via DMA Allocation of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CVE-2017-9725, RHSA-2018:0676-01, RHSA-2018:1062-01, RHSA-2018:1130-01, RHSA-2018:1170-01, VIGILANCE-VUL-25817
Google Android/Pixel: multiple vulnerabilities of April 2018
An attacker can use several vulnerabilities of Google Android/Pixel...
CERTFR-2018-AVI-164, CVE-2014-10039, CVE-2014-10043, CVE-2014-10044, CVE-2014-10045, CVE-2014-10046, CVE-2014-10047, CVE-2014-10048, CVE-2014-10050, CVE-2014-10051, CVE-2014-10052, CVE-2014-10053, CVE-2014-10054, CVE-2014-10055, CVE-2014-10056, CVE-2014-10057, CVE-2014-10058, CVE-2014-10059, CVE-2014-10062, CVE-2014-10063, CVE-2014-9971, CVE-2014-9972, CVE-2014-9976, CVE-2014-9981, CVE-2014-9985, CVE-2014-9986, CVE-2014-9987, CVE-2014-9988, CVE-2014-9989, CVE-2014-9990, CVE-2014-9991, CVE-2014-9993, CVE-2014-9994, CVE-2014-9995, CVE-2014-9996, CVE-2014-9997, CVE-2014-9998, CVE-2015-0574, CVE-2015-0576, CVE-2015-8593, CVE-2015-8594, CVE-2015-9063, CVE-2015-9064, CVE-2015-9065, CVE-2015-9066, CVE-2015-9108, CVE-2015-9109, CVE-2015-9110, CVE-2015-9111, CVE-2015-9112, CVE-2015-9113, CVE-2015-9114, CVE-2015-9115, CVE-2015-9116, CVE-2015-9118, CVE-2015-9119, CVE-2015-9120, CVE-2015-9122, CVE-2015-9123, CVE-2015-9124, CVE-2015-9126, CVE-2015-9127, CVE-2015-9128, CVE-2015-9129, CVE-2015-9130, CVE-2015-9131, CVE-2015-9132, CVE-2015-9133, CVE-2015-9134, CVE-2015-9135, CVE-2015-9136, CVE-2015-9137, CVE-2015-9138, CVE-2015-9139, CVE-2015-9140, CVE-2015-9141, CVE-2015-9142, CVE-2015-9143, CVE-2015-9144, CVE-2015-9145, CVE-2015-9146, CVE-2015-9147, CVE-2015-9148, CVE-2015-9149, CVE-2015-9150, CVE-2015-9151, CVE-2015-9152, CVE-2015-9153, CVE-2015-9156, CVE-2015-9157, CVE-2015-9158, CVE-2015-9159, CVE-2015-9160, CVE-2015-9161, CVE-2015-9162, CVE-2015-9163, CVE-2015-9164, CVE-2015-9165, CVE-2015-9166, CVE-2015-9167, CVE-2015-9169, CVE-2015-9170, CVE-2015-9171, CVE-2015-9172, CVE-2015-9173, CVE-2015-9174, CVE-2015-9175, CVE-2015-9176, CVE-2015-9177, CVE-2015-9178, CVE-2015-9179, CVE-2015-9180, CVE-2015-9181, CVE-2015-9182, CVE-2015-9183, CVE-2015-9184, CVE-2015-9185, CVE-2015-9186, CVE-2015-9187, CVE-2015-9188, CVE-2015-9189, CVE-2015-9190, CVE-2015-9191, CVE-2015-9192, CVE-2015-9193, CVE-2015-9194, CVE-2015-9195, CVE-2015-9196, CVE-2015-9197, CVE-2015-9198, CVE-2015-9199, CVE-2015-9200, CVE-2015-9201, CVE-2015-9202, CVE-2015-9203, CVE-2015-9204, CVE-2015-9205, CVE-2015-9206, CVE-2015-9207, CVE-2015-9208, CVE-2015-9209, CVE-2015-9210, CVE-2015-9211, CVE-2015-9212, CVE-2015-9213, CVE-2015-9215, CVE-2015-9216, CVE-2015-9217, CVE-2015-9218, CVE-2015-9219, CVE-2015-9220, CVE-2015-9221, CVE-2015-9222, CVE-2015-9223, CVE-2015-9224, CVE-2016-10380, CVE-2016-10381, CVE-2016-10384, CVE-2016-10385, CVE-2016-10386, CVE-2016-10387, CVE-2016-10390, CVE-2016-10392, CVE-2016-10406, CVE-2016-10407, CVE-2016-10409, CVE-2016-10410, CVE-2016-10411, CVE-2016-10412, CVE-2016-10414, CVE-2016-10415, CVE-2016-10416, CVE-2016-10417, CVE-2016-10418, CVE-2016-10419, CVE-2016-10420, CVE-2016-10421, CVE-2016-10422, CVE-2016-10423, CVE-2016-10424, CVE-2016-10425, CVE-2016-10426, CVE-2016-10427, CVE-2016-10428, CVE-2016-10429, CVE-2016-10430, CVE-2016-10431, CVE-2016-10432, CVE-2016-10433, CVE-2016-10434, CVE-2016-10435, CVE-2016-10436, CVE-2016-10437, CVE-2016-10438, CVE-2016-10439, CVE-2016-10440, CVE-2016-10441, CVE-2016-10442, CVE-2016-10443, CVE-2016-10444, CVE-2016-10445, CVE-2016-10446, CVE-2016-10447, CVE-2016-10448, CVE-2016-10449, CVE-2016-10450, CVE-2016-10451, CVE-2016-10452, CVE-2016-10454, CVE-2016-10455, CVE-2016-10456, CVE-2016-10457, CVE-2016-10458, CVE-2016-10459, CVE-2016-10460, CVE-2016-10461, CVE-2016-10462, CVE-2016-10464, CVE-2016-10466, CVE-2016-10467, CVE-2016-10469, CVE-2016-10471, CVE-2016-10472, CVE-2016-10473, CVE-2016-10474, CVE-2016-10475, CVE-2016-10476, CVE-2016-10477, CVE-2016-10478, CVE-2016-10479, CVE-2016-10480, CVE-2016-10481, CVE-2016-10482, CVE-2016-10483, CVE-2016-10484, CVE-2016-10485, CVE-2016-10486, CVE-2016-10487, CVE-2016-10489, CVE-2016-10490, CVE-2016-10491, CVE-2016-10492, CVE-2016-10493, CVE-2016-10494, CVE-2016-10495, CVE-2016-10496, CVE-2016-10497, CVE-2016-10498, CVE-2016-10499, CVE-2016-10501, CVE-2016-5348, CVE-2017-11011, CVE-2017-11075, CVE-2017-13267, CVE-2017-13274, CVE-2017-13275, CVE-2017-13276, CVE-2017-13277, CVE-2017-13278, CVE-2017-13279, CVE-2017-13280, CVE-2017-13281, CVE-2017-13282, CVE-2017-13283, CVE-2017-13284, CVE-2017-13285, CVE-2017-13286, CVE-2017-13287, CVE-2017-13288, CVE-2017-13289, CVE-2017-13290, CVE-2017-13291, CVE-2017-13292, CVE-2017-13293, CVE-2017-13294, CVE-2017-13295, CVE-2017-13296, CVE-2017-13297, CVE-2017-13298, CVE-2017-13299, CVE-2017-13300, CVE-2017-13301, CVE-2017-13302, CVE-2017-13303, CVE-2017-13304, CVE-2017-13306, CVE-2017-13307, CVE-2017-14880, CVE-2017-14890, CVE-2017-14894, CVE-2017-15822, CVE-2017-15836, CVE-2017-15837, CVE-2017-15853, CVE-2017-15855, CVE-2017-1653, CVE-2017-17770, CVE-2017-18071, CVE-2017-18072, CVE-2017-18073, CVE-2017-18074, CVE-2017-18125, CVE-2017-18126, CVE-2017-18127, CVE-2017-18128, CVE-2017-18129, CVE-2017-18130, CVE-2017-18132, CVE-2017-18133, CVE-2017-18134, CVE-2017-18135, CVE-2017-18136, CVE-2017-18137, CVE-2017-18138, CVE-2017-18139, CVE-2017-18140, CVE-2017-18142, CVE-2017-18143, CVE-2017-18144, CVE-2017-18145, CVE-2017-18146, CVE-2017-18147, CVE-2017-8269, CVE-2017-8274, CVE-2017-8275, CVE-2018-3563, CVE-2018-3566, CVE-2018-3567, CVE-2018-3568, CVE-2018-3584, CVE-2018-3589, CVE-2018-3590, CVE-2018-3591, CVE-2018-3592, CVE-2018-3593, CVE-2018-3594, CVE-2018-3596, CVE-2018-3598, CVE-2018-3599, CVE-2018-5820, CVE-2018-5821, CVE-2018-5822, CVE-2018-5823, CVE-2018-5824, CVE-2018-5825, CVE-2018-5826, CVE-2018-5827, CVE-2018-5828, VIGILANCE-VUL-25758
Linux kernel: denial of service via add_free_nid
An attacker can generate a fatal error via add_free_nid() of the Linux kernel, in order to trigger a denial of service...
CERTFR-2018-AVI-301, CERTFR-2018-AVI-308, CERTFR-2018-AVI-319, CERTFR-2019-AVI-145, CVE-2017-18249, DLA-1715-1, openSUSE-SU-2018:1773-1, SSA:2019-030-01, SUSE-SU-2018:1772-1, SUSE-SU-2018:1816-1, SUSE-SU-2018:1855-1, SUSE-SU-2019:0470-1, SUSE-SU-2019:0901-1, USN-3932-1, USN-3932-2, VIGILANCE-VUL-25659
Libvorbis: memory corruption via Codebook
An attacker can generate a memory corruption via Codebook of Libvorbis, in order to trigger a denial of service, and possibly to run code...
bulletinapr2018, CVE-2018-5146, DLA-1368-1, DSA-4140-1, FEDORA-2018-061bafe369, FEDORA-2018-f26d891469, FEDORA-2019-2e385f97e2, openSUSE-SU-2018:0805-1, RHSA-2018:0649-01, RHSA-2018:1058-01, SSA:2018-076-01, USN-3604-1, VIGILANCE-VUL-25574, ZDI-18-263
Linux kernel: memory corruption via ebtables CONFIG_COMPAT
An attacker can generate a memory corruption via ebtables CONFIG_COMPAT of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2018-AVI-147, CERTFR-2018-AVI-161, CERTFR-2018-AVI-197, CERTFR-2018-AVI-228, CERTFR-2018-AVI-250, CERTFR-2018-AVI-257, CERTFR-2018-AVI-277, CERTFR-2018-AVI-392, CERTFR-2018-AVI-426, CERTFR-2018-AVI-584, CERTFR-2019-AVI-621, CVE-2018-1068, DLA-1369-1, DSA-4187-1, DSA-4188-1, FEDORA-2018-296bf0c332, FEDORA-2018-959aac67a3, ibm10742755, openSUSE-SU-2018:0781-1, RHSA-2018:1318-01, RHSA-2018:1355-01, RHSA-2018:2948-01, RHSA-2019:1170-01, RHSA-2019:1190-01, RHSA-2019:4159-01, SUSE-SU-2018:0785-1, SUSE-SU-2018:0786-1, SUSE-SU-2018:0834-1, SUSE-SU-2018:0848-1, SUSE-SU-2018:2332-1, SUSE-SU-2018:2366-1, SUSE-SU-2018:2637-1, USN-3654-1, USN-3654-2, USN-3656-1, USN-3674-1, USN-3674-2, USN-3677-1, USN-3677-2, VIGILANCE-VUL-25571
Linux kernel: memory corruption via tcp_v6_syn_recv_sock
An attacker can generate a memory corruption via tcp_v6_syn_recv_sock() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CVE-2018-5703, FEDORA-2018-2bce10900e, VIGILANCE-VUL-25550
Our database contains other pages. You can request a free trial to read them.

Display information about Google Android Jelly Bean: