The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Linux kernel

Linux kernel: information disclosure via timer_create
A local attacker can read a memory fragment via timer_create() of the Linux kernel, in order to obtain sensitive information...
CERTFR-2018-AVI-375, CERTFR-2018-AVI-390, CERTFR-2018-AVI-392, CERTFR-2018-AVI-419, CERTFR-2018-AVI-533, CVE-2017-18344, K07020416, openSUSE-SU-2018:2242-1, openSUSE-SU-2018:2404-1, RHSA-2018:2948-01, RHSA-2018:3083-01, RHSA-2018:3096-01, RHSA-2018:3459-01, RHSA-2018:3540-01, RHSA-2018:3586-01, RHSA-2018:3590-01, RHSA-2018:3591-01, SUSE-SU-2018:2223-1, SUSE-SU-2018:2328-1, SUSE-SU-2018:2344-1, SUSE-SU-2018:2374-1, SUSE-SU-2018:2596-1, USN-3742-1, USN-3742-2, USN-3742-3, VIGILANCE-VUL-26860
Linux kernel: information disclosure via pcpu_embed_first_chunk
A local attacker can read a memory fragment via pcpu_embed_first_chunk() of the Linux kernel, in order to obtain sensitive information...
CERTFR-2019-AVI-392, CVE-2018-5995, DLA-1799-1, DLA-1799-2, DLA-1885-1, DSA-4497-1, VIGILANCE-VUL-26927
Linux kernel: information disclosure via swiotlb_print_info
A local attacker can read a memory fragment via swiotlb_print_info() of the Linux kernel, in order to obtain sensitive information...
CVE-2018-5953, DLA-1731-1, DLA-1731-2, VIGILANCE-VUL-26926
Linux kernel: denial of service via SegmentSmack
An attacker can generate a fatal error via tcp_prune_ofo_queue() of the Linux kernel, in order to trigger a denial of service...
CERTFR-2018-AVI-374, CERTFR-2018-AVI-375, CERTFR-2018-AVI-386, CERTFR-2018-AVI-390, CERTFR-2018-AVI-392, CERTFR-2018-AVI-419, CERTFR-2018-AVI-420, CERTFR-2018-AVI-428, CERTFR-2018-AVI-457, CERTFR-2018-AVI-584, CERTFR-2019-AVI-346, CERTFR-2019-AVI-354, CERTFR-2020-AVI-207, cisco-sa-20180824-linux-tcp, cpujan2019, cpujul2020, CVE-2018-5390, DLA-1466-1, DSA-4266-1, ibm10742755, JSA10876, JSA10917, K95343321, openSUSE-SU-2018:2242-1, openSUSE-SU-2018:2404-1, RHSA-2018:2384-01, RHSA-2018:2395-01, RHSA-2018:2645-01, RHSA-2018:2776-01, RHSA-2018:2785-01, RHSA-2018:2789-01, RHSA-2018:2790-01, RHSA-2018:2791-01, RHSA-2018:2924-01, RHSA-2018:2933-01, RHSA-2018:2948-01, SB10249, SegmentSmack, sk134253, SSA-377115, SSB-439005, SUSE-SU-2018:2223-1, SUSE-SU-2018:2328-1, SUSE-SU-2018:2344-1, SUSE-SU-2018:2374-1, SUSE-SU-2018:2596-1, SUSE-SU-2019:14127-1, SUSE-SU-2019:1870-1, SYMSA1467, USN-3732-1, USN-3732-2, USN-3741-1, USN-3741-2, USN-3741-3, USN-3742-1, USN-3742-2, USN-3742-3, USN-3763-1, VIGILANCE-VUL-26913, VU#962459
Linux kernel: information disclosure via posix-timer
An attacker can bypass access restrictions to data via posix-timer of the Linux kernel, in order to obtain sensitive information...
VIGILANCE-VUL-26901
Linux kernel: use after free via ucma_leave_multicast
An attacker can force the usage of a freed memory area via ucma_leave_multicast() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
1103505, CERTFR-2018-AVI-392, CERTFR-2018-AVI-419, CERTFR-2018-AVI-459, CERTFR-2018-AVI-460, CERTFR-2018-AVI-508, CERTFR-2018-AVI-608, CERTFR-2019-AVI-183, CVE-2018-14734, DLA-1529-1, DLA-1531-1, DSA-4308-1, FEDORA-2018-2f6df9abfb, FEDORA-2018-ca0e10fc6e, openSUSE-SU-2018:2404-1, RHSA-2019:0831-01, RHSA-2019:2029-01, RHSA-2019:2043-01, SUSE-SU-2018:2328-1, SUSE-SU-2018:2344-1, SUSE-SU-2018:2362-1, SUSE-SU-2018:2374-1, SUSE-SU-2018:2384-1, SUSE-SU-2018:2596-1, SUSE-SU-2018:2879-1, SUSE-SU-2018:2907-1, SUSE-SU-2018:3088-1, USN-3797-1, USN-3797-2, USN-3847-1, USN-3847-2, USN-3847-3, USN-3849-1, USN-3849-2, VIGILANCE-VUL-26871
Linux kernel: privilege escalation via KVM GDT.LIMIT
An attacker can bypass restrictions via KVM GDT.LIMIT of the Linux kernel, in order to escalate his privileges...
CERTFR-2018-AVI-386, cpuapr2019, cpujul2020, CVE-2018-10901, JSA10917, K07721343, RHSA-2018:2390-01, RHSA-2018:2391-01, RHSA-2018:2392-01, RHSA-2018:2393-01, RHSA-2018:2394-01, VIGILANCE-VUL-26861
Linux kernel, Xen: memory corruption via PV Syscall Return Path
An attacker can generate a memory corruption via PV Syscall Return Path of Xen, in order to trigger a denial of service, and possibly to run code...
CERTFR-2018-AVI-363, CERTFR-2018-AVI-480, CERTFR-2019-AVI-145, CVE-2018-14678, DLA-1529-1, DLA-1531-1, DSA-4308-1, FEDORA-2018-49bda79bd5, FEDORA-2018-cc812838fb, SUSE-SU-2018:3084-1, USN-3931-1, USN-3931-2, VIGILANCE-VUL-26848, XSA-274
Linux kernel: out-of-bounds memory reading via driver_override
An attacker can force a read at an invalid address via driver_override() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
CERTFR-2018-AVI-358, CERTFR-2018-AVI-365, CERTFR-2018-AVI-392, CVE-2018-9385, openSUSE-SU-2018:2118-1, openSUSE-SU-2018:2119-1, SUSE-SU-2018:2051-1, SUSE-SU-2018:2150-1, SUSE-SU-2018:2344-1, VIGILANCE-VUL-26825
Linux kernel: memory corruption via ext4_init_block_bitmap
An attacker can generate a memory corruption via ext4_init_block_bitmap() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
199865, CERTFR-2018-AVI-408, CERTFR-2018-AVI-419, CERTFR-2018-AVI-456, CERTFR-2018-AVI-460, CERTFR-2018-AVI-480, CERTFR-2019-AVI-035, CERTFR-2019-AVI-041, CERTFR-2019-AVI-188, CVE-2018-10878, DLA-1423-1, DLA-1424-1, DLA-1434-1, DLA-1529-1, openSUSE-SU-2018:2404-1, openSUSE-SU-2018:2407-1, RHSA-2018:2948-01, RHSA-2018:3083-01, RHSA-2018:3096-01, SUSE-SU-2018:2380-1, SUSE-SU-2018:2381-1, SUSE-SU-2018:2596-1, SUSE-SU-2018:2858-1, SUSE-SU-2018:2908-1, SUSE-SU-2018:2908-2, SUSE-SU-2018:3083-1, SUSE-SU-2018:3084-1, USN-3753-1, USN-3753-2, USN-3871-1, USN-3871-2, USN-3871-3, USN-3871-4, USN-3871-5, VIGILANCE-VUL-26789
Our database contains other pages. You can request a free trial to read them.

Display information about Linux kernel: