|Max CVSS||7.8||Min CVSS||2.1||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (unin
|03-10-2019 - 00:03||28-07-2018 - 18:29|
kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel a
|24-09-2019 - 20:15||01-02-2019 - 22:29|
In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.
|20-09-2019 - 14:15||15-02-2019 - 15:29|
In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.
|10-09-2019 - 22:15||03-12-2018 - 17:29|
The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.
|06-08-2019 - 17:15||21-03-2019 - 16:01|
In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check
|17-06-2019 - 21:15||05-03-2019 - 22:29|
The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.
|15-06-2019 - 01:29||21-03-2019 - 16:01|
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
|06-05-2019 - 19:24||21-02-2019 - 05:29|
In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.
|12-04-2019 - 12:29||18-02-2019 - 18:29|
arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of
|03-04-2019 - 01:29||07-10-2018 - 06:29|