Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2015-1341

Summary
Assigner-canonical
Assigner Org ID-cc1ad9ee-3454-478d-9317-d3e869d708bc
Published At-22 Apr, 2019 | 15:35
Updated At-16 Sep, 2024 | 23:45
Rejected At-
Credits

Apport privilege escalation through Python module imports

Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:canonical
Assigner Org ID:cc1ad9ee-3454-478d-9317-d3e869d708bc
Published At:22 Apr, 2019 | 15:35
Updated At:16 Sep, 2024 | 23:45
Rejected At:
▼CVE Numbering Authority (CNA)
Apport privilege escalation through Python module imports

Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.

Affected Products
Vendor
UbuntuUbuntu
Product
Apport
Versions
Affected
  • From unspecified before 2.0.1-0ubuntu17.13 (custom)
  • From unspecified before 2.19.1-0ubuntu4 (custom)
  • From unspecified before 2.17.2-0ubuntu1.7 (custom)
  • From unspecified before 2.14.1-0ubuntu3.18 (custom)
  • From unspecified before 2.19.2 (custom)
Problem Types
TypeCWE IDDescription
textN/AParsing a Python module by executing the module.
Type: text
CWE ID: N/A
Description: Parsing a Python module by executing the module.
Metrics
VersionBase scoreBase severityVector
3.07.4HIGH
CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Version: 3.0
Base score: 7.4
Base severity: HIGH
Vector:
CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Gabriel Campana
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://launchpad.net/apport/trunk/2.19.2
x_refsource_MISC
https://usn.ubuntu.com/2782-1/
x_refsource_MISC
Hyperlink: https://launchpad.net/apport/trunk/2.19.2
Resource:
x_refsource_MISC
Hyperlink: https://usn.ubuntu.com/2782-1/
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://launchpad.net/apport/trunk/2.19.2
x_refsource_MISC
x_transferred
https://usn.ubuntu.com/2782-1/
x_refsource_MISC
x_transferred
Hyperlink: https://launchpad.net/apport/trunk/2.19.2
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://usn.ubuntu.com/2782-1/
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@ubuntu.com
Published At:22 Apr, 2019 | 16:29
Updated At:07 May, 2019 | 20:29

Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.8HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.07.4HIGH
CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.0
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.0
Base score: 7.4
Base severity: HIGH
Vector:
CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Canonical Ltd.
canonical
>>ubuntu_linux>>12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>15.04
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>15.10
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>apport>>Versions before 2.19.2(exclusive)
cpe:2.3:a:canonical:apport:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
CWE ID: CWE-264
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://launchpad.net/apport/trunk/2.19.2security@ubuntu.com
Third Party Advisory
https://usn.ubuntu.com/2782-1/security@ubuntu.com
Third Party Advisory
Hyperlink: https://launchpad.net/apport/trunk/2.19.2
Source: security@ubuntu.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/2782-1/
Source: security@ubuntu.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

417Records found

CVE-2009-3080
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.07% / 21.99%
||
7 Day CHG~0.00%
Published-20 Nov, 2009 | 17:00
Updated-07 Aug, 2024 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSUSEDebian GNU/LinuxVMware (Broadcom Inc.)Red Hat, Inc.openSUSECanonical Ltd.
Product-enterprise_linux_serverubuntu_linuxesxlinux_enterprise_serverdebian_linuxlinux_kernelvirtualizationopensusefedoraenterprise_linux_server_workstationenterprise_linux_euslinux_enterprise_desktopenterprise_linux_desktopn/a
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2009-2698
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-21.80% / 95.53%
||
7 Day CHG~0.00%
Published-27 Aug, 2009 | 17:00
Updated-07 Aug, 2024 | 05:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSUSEVMware (Broadcom Inc.)Red Hat, Inc.Fedora ProjectCanonical Ltd.
Product-enterprise_linux_serverubuntu_linuxlinux_enterprise_serverlinux_kernelenterprise_linux_server_ausenterprise_linux_workstationfedoraenterprise_linux_eusvcenter_serverlinux_enterprise_desktopenterprise_linux_desktopesxin/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2020-8835
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-28.03% / 96.29%
||
7 Day CHG+0.51%
Published-02 Apr, 2020 | 18:00
Updated-17 Sep, 2024 | 02:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linux kernel bpf verifier vulnerability

In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5.4 stable series, starting with v5.4.7, as the introducing commit was backported to that branch. This vulnerability was fixed in 5.6.1, 5.5.14, and 5.4.29. (issue is aka ZDI-CAN-10780)

Action-Not Available
Vendor-Linux kernelNetApp, Inc.Fedora ProjectLinux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxa700s_firmwarea320_firmwarecloud_backupa400_firmwarefas2720fas2720_firmwareh300s_firmwareh410sc190h610s_firmwareh300ssteelstore_cloud_integrated_storageh300e_firmwareh610s8700fas2750_firmwarefas2750h500ehci_management_nodefedorah500s_firmwareh500e_firmwarea700sa220h700e8700_firmwareh610c_firmwareh610ch300ea800h500sh615c_firmwarea3208300_firmwaresolidfire8300a800_firmwarelinux_kernela400h410s_firmwareh700s_firmwarec190_firmwarea220_firmwareh700e_firmwareh615ch700sLinux kernel
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2009-1185
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-86.49% / 99.37%
||
7 Day CHG~0.00%
Published-17 Apr, 2009 | 14:00
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.

Action-Not Available
Vendor-udev_projectn/aSUSEDebian GNU/LinuxJuniper Networks, Inc.Fedora ProjectopenSUSECanonical Ltd.
Product-ubuntu_linuxlinux_enterprise_serverdebian_linuxopensusefedoralinux_enterprise_debuginfoudevlinux_enterprise_desktopctpviewn/a
CWE ID-CWE-346
Origin Validation Error
CVE-2019-2214
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.52%
||
7 Day CHG~0.00%
Published-13 Nov, 2019 | 17:44
Updated-04 Aug, 2024 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In binder_transaction of binder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-136210786References: Upstream kernel

Action-Not Available
Vendor-n/aCanonical Ltd.Google LLC
Product-androidubuntu_linuxAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-19807
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 25.48%
||
7 Day CHG~0.00%
Published-15 Dec, 2019 | 22:59
Updated-05 Aug, 2024 | 02:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for a different purpose after refactoring.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kerneln/a
CWE ID-CWE-416
Use After Free
CVE-2019-18198
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 35.00%
||
7 Day CHG~0.00%
Published-18 Oct, 2019 | 21:07
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kerneln/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2019-16729
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.66%
||
7 Day CHG~0.00%
Published-24 Sep, 2019 | 04:07
Updated-05 Aug, 2024 | 01:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

pam-python before 1.0.7-1 has an issue in regard to the default environment variable handling of Python, which could allow for local root escalation in certain PAM setups.

Action-Not Available
Vendor-pam-python_projectn/aCanonical Ltd.Debian GNU/Linux
Product-ubuntu_linuxdebian_linuxpam-pythonn/a
CVE-2019-15925
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 23.17%
||
7 Day CHG~0.00%
Published-04 Sep, 2019 | 20:33
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 5.2.3. An out of bounds access exists in the function hclge_tm_schd_mode_vnet_base_cfg in the file drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kerneln/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-15794
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-7.1||HIGH
EPSS-0.50% / 64.77%
||
7 Day CHG~0.00%
Published-23 Apr, 2020 | 23:55
Updated-16 Sep, 2024 | 19:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reference counting error in overlayfs/shiftfs error path when used in conjuction with aufs

Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma->vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow.

Action-Not Available
Vendor-UbuntuLinux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kernelLinux kernel
CWE ID-CWE-672
Operation on a Resource after Expiration or Release
CVE-2019-14816
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.35% / 56.96%
||
7 Day CHG~0.00%
Published-20 Sep, 2019 | 18:25
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.

Action-Not Available
Vendor-NetApp, Inc.Fedora ProjectCanonical Ltd.Red Hat, Inc.Linux Kernel Organization, IncopenSUSEDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxa700s_firmwarea320_firmwareenterprise_linux_server_ausfas2720fas2720_firmwareh300s_firmwareh410sc190h610s_firmwareh300senterprise_linux_tussteelstore_cloud_integrated_storageh300e_firmwareh610sfas2750fas2750_firmwareh500ehci_management_nodefedorah500s_firmwareh500e_firmwareenterprise_linux_eusa700sa220h700sh700edata_availability_servicesleaph300ea800virtualizationh500sservice_processorenterprise_linuxenterprise_linux_for_real_time_for_nfventerprise_linux_for_real_time_tusa320enterprise_linux_compute_node_eussolidfirea800_firmwaredebian_linuxlinux_kernelh410s_firmwareh700s_firmwarec190_firmwarea220_firmwareenterprise_linux_for_power_big_endian_eusenterprise_linux_server_tush700e_firmwareenterprise_linux_for_real_time_for_nfv_tusenterprise_linux_for_real_timemessaging_realtime_gridkernel
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-15789
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-8.8||HIGH
EPSS-0.04% / 13.22%
||
7 Day CHG~0.00%
Published-08 Apr, 2020 | 01:00
Updated-16 Sep, 2024 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microk8s Privilege Escalation Vulnerability

Privilege escalation vulnerability in MicroK8s allows a low privilege user with local access to obtain root access to the host by provisioning a privileged container. Fixed in MicroK8s 1.15.3.

Action-Not Available
Vendor-Canonical Ltd.
Product-microk8sMicroK8s
CWE ID-CWE-269
Improper Privilege Management
CVE-2019-14835
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.03% / 5.25%
||
7 Day CHG~0.00%
Published-17 Sep, 2019 | 15:09
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.

Action-Not Available
Vendor-Linux KernelHuawei Technologies Co., Ltd.Fedora ProjectopenSUSECanonical Ltd.Red Hat, Inc.Linux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuximanager_netecoopenshift_container_platformenterprise_linux_server_aush410c_firmwareh300s_firmwarevirtualization_hosth410sh610s_firmwareh300ssteelstore_cloud_integrated_storageh610sh300e_firmwareh500ehci_management_nodeenterprise_linux_workstationfedorah500s_firmwareh500e_firmwareenterprise_linux_eush700eaff_a700s_firmwareenterprise_linux_desktopleapdata_availability_servicesmanageoneh300evirtualizationh500sservice_processorenterprise_linuxaff_a700ssolidfiredebian_linuxlinux_kernelh410s_firmwareh700s_firmwareh410ch700e_firmwareenterprise_linux_server_tush700simanager_neteco_6000enterprise_linux_for_real_timeLinux kernel
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-14821
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.29%
||
7 Day CHG~0.00%
Published-19 Sep, 2019 | 17:37
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

Action-Not Available
Vendor-Red Hat, Inc.openSUSENetApp, Inc.Debian GNU/LinuxFedora ProjectCanonical Ltd.Linux Kernel Organization, IncOracle Corporation
Product-enterprise_linux_serverubuntu_linuxenterprise_linux_server_ausvirtualization_hosth300s_firmwareh410c_firmwareh410sh610s_firmwareh300sh300e_firmwareh610sh500ehci_management_nodeenterprise_linux_workstationfedorah500s_firmwareh500e_firmwareenterprise_linux_eush700eaff_a700s_firmwareenterprise_linux_desktopleapdata_availability_servicesh300esd-wan_edgeh500senterprise_linuxaff_a700ssolidfiredebian_linuxlinux_kernelh410s_firmwareh700s_firmwareh410centerprise_linux_server_tush700e_firmwareh700senterprise_linux_for_real_timeKernel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-11476
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 29.04%
||
7 Day CHG~0.00%
Published-29 Aug, 2019 | 14:38
Updated-16 Sep, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer overflow in whoopsie results in out-of-bounds heap write

An integer overflow in whoopsie before versions 0.2.52.5ubuntu0.1, 0.2.62ubuntu0.1, 0.2.64ubuntu0.1, 0.2.66, results in an out-of-bounds write to a heap allocated buffer when processing large crash dumps. This results in a crash or possible code-execution in the context of the whoopsie process.

Action-Not Available
Vendor-Canonical Ltd.Ubuntu
Product-ubuntu_linuxWhoopsie
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2019-15918
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.84%
||
7 Day CHG~0.00%
Published-04 Sep, 2019 | 18:09
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 5.0.10. SMB2_negotiate in fs/cifs/smb2pdu.c has an out-of-bounds read because data structures are incompletely updated after a change from smb30 to smb21.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kerneln/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-10161
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.07% / 22.64%
||
7 Day CHG~0.00%
Published-30 Jul, 2019 | 22:14
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.

Action-Not Available
Vendor-LibvirtCanonical Ltd.Red Hat, Inc.
Product-ubuntu_linuxvirtualizationenterprise_linuxvirtualization_hostlibvirtlibvirt
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2016-9774
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.05%
||
7 Day CHG~0.00%
Published-23 Mar, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4 on Debian wheezy, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package before 7.0.28-4+deb7u8 on Debian wheezy, before 7.0.56-3+deb8u6 on Debian jessie, before 7.0.52-1ubuntu0.8 on Ubuntu 14.04 LTS, and on Ubuntu 12.04 LTS, 16.04 LTS, and 16.10; and the tomcat8 package before 8.0.14-1+deb8u5 on Debian jessie, before 8.0.32-1ubuntu1.3 on Ubuntu 16.04 LTS, before 8.0.37-1ubuntu0.1 on Ubuntu 16.10, and before 8.0.38-2ubuntu1 on Ubuntu 17.04 might allow local users with access to the tomcat account to obtain sensitive information or gain root privileges via a symlink attack on the Catalina localhost directory.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.The Apache Software Foundation
Product-ubuntu_linuxdebian_linuxtomcatn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-0155
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.05%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:42
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aCanonical Ltd.Red Hat, Inc.Intel Corporation
Product-enterprise_linux_server_euspentium_gold_g4600pentium_silver_n5000_firmwareenterprise_linux_server_auscore_i3-9100_firmwarexeon_e3-1558l_v5celeron_j1900_firmwarecore_i5-1035g7xeon_e3-1501l_v6_firmwarecore_i3-8350k_firmwarecore_i3-9350k_firmwarepentium_gold_g5420xeon_e-2124g_firmwarecore_i5-8305g_firmwarecore_i5-7500_firmwarepentium_gold_g5420t_firmwarexeon_e-2254me_firmwarecore_i5-8400hceleron_j1850core_m-5y71_firmwarexeon_e-2276me_firmwarepentium_gold_g5420_firmwarecore_i5-7y54pentium_d1509_firmwareceleron_n2815core_i7-9700core_i7-6650u_firmwarexeon_e-2226gpentium_gold_g5400tpentium_gold_g4560_firmwarecore_i7-5500u_firmwarecore_i5-1035g4core_i3-8145uceleron_n3000_firmwarexeon_e-2276m_firmwarecore_i5-9600_firmwarecore_i5-9600t_firmwarecore_i9-9940x_firmwarecore_i7-6700tecore_i7-6567u_firmwarexeon_e3-1501l_v6core_i3-8109ucore_i9-7920xcore_i7-7600uxeon_e-2224xeon_e-2186m_firmwarecore_i5-7y57_firmwarecore_i3-7300core_i9-7940x_firmwarecore_i5-8269u_firmwarexeon_e3-1505l_v6xeon_e-2278gegraphics_drivercore_i5-6287u_firmwarexeon_e-2134_firmwarecore_i5-5350h_firmwarepentium_g4560tcore_m5-6y54celeron_n3150celeron_n4100celeron_n3060core_i7-7600u_firmwarecore_i5-8400bcore_i3-9300t_firmwarecore_i5-5250ucore_i7-10710u_firmwarecore_i7-7820hkpentium_d1517core_i5-9500_firmwarecore_i7-5850hqcore_m-5y10ccore_i9-9940xpentium_gold_g5620xeon_e3-1558l_v5_firmwarecore_i5-8400h_firmwareceleron_n4120core_i7-6970hqcore_i5-8600celeron_g3930texeon_e-2136core_i7-10510ucore_i7-9700kcore_i5-9400_firmwareceleron_n2840pentium_g4600t_firmwarecore_i7-8500y_firmwareceleron_g4930e_firmwarecore_i3-8100celeron_n2930celeron_n2840_firmwarecore_m7-6y75pentium_n3540_firmwareceleron_g4900tcore_i3-7300_firmwarecore_m3-6y30core_m-5y31_firmwarexeon_e3-1535m_v5core_i5-7287u_firmwarecore_i7-7700core_m-5y10celeron_g3900te_firmwarecore_i7-7820hq_firmwarecore_i7-5950hq_firmwarecore_i7-7920hq_firmwareceleron_g4932epentium_d1517_firmwarecore_i5-8600kxeon_e3-1575m_v5_firmwarecore_i7-8700k_firmwarecore_i7-5750hq_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarecore_i7-8750hcore_i7-5700hq_firmwareceleron_g3900_firmwarecore_i5-8365uxeon_e3-1501m_v6celeron_j3060core_i9-9960x_firmwarexeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarecore_i5-8500b_firmwareceleron_n3160core_i3-7100u_firmwareceleron_g4930core_i5-7600core_i3-6100h_firmwarecore_i9-7940xcore_i9-9960xxeon_e-2286mxeon_e3-1505m_v5pentium_gold_g4600_firmwarepentium_n3540pentium_3560mcore_i7-5650uxeon_e-2276gcore_i3-8300xeon_e-2186gcore_i5-7400tcore_i7-5557u_firmwarecore_i5-7267u_firmwarecore_i3-5005ucore_i3-5020uxeon_e-2174gcore_i3-7100core_i7-8809gceleron_j4105celeron_g4932e_firmwarecore_i5-7260ucore_i7-8700bcore_i5-5257ucore_m-5y70core_i7-7500u_firmwareceleron_j1800core_i3-9130u_firmwarecore_i5-7267ucore_i7-7800xcore_i5\+8500core_i5-5300ucore_m-5y10a_firmwarexeon_e3-1585_v5core_i5-10210ycore_i7-7820hk_firmwarecore_i7-6560ucore_i5-9400tceleron_j3355core_i5-10210u_firmwarecore_i7-5550u_firmwarecore_i5-8300hcore_i5-8600t_firmwareatom_x7-e3950core_i3-10110ycore_i3-7300t_firmwarexeon_e3-1535m_v6_firmwareceleron_j3355ecore_i7-5600uceleron_g4930epentium_gold_4410ycore_i9-9900kscore_i5-9600celeron_j4125_firmwarepentium_gold_g5500tpentium_g4400_firmwarexeon_e3-1585l_v5_firmwarepentium_3805u_firmwarepentium_3805ucore_i5-7300u_firmwarecore_i5-8600_firmwarexeon_e-2224_firmwareceleron_n3350core_i5-9300h_firmwarecore_i3-6167uceleron_g4920xeon_e-2274gcore_i5-9500core_i3-9320_firmwarepentium_silver_j5005xeon_e-2278gelcore_i5-8400b_firmwarecore_i5-5200ucore_i7-6700t_firmwarecore_i3-8100_firmwareceleron_n2807core_i7-6500upentium_j3710core_i7-6500u_firmwareceleron_g3902exeon_e-2124core_i9-9880hcore_i7-10710ucore_i5-7287ucore_i5-8500t_firmwarecore_i3-7100h_firmwareatom_x5-e3930_firmwarecore_i5-8300h_firmwarexeon_e-2136_firmwarepentium_n3530xeon_e-2276g_firmwarecore_i5-6300upentium_gold_g4560xeon_e-2276mecore_i7-8565uceleron_n3350_firmwarecore_i9-9980xe_firmwarecore_i5-7300hq_firmwarecore_i3-5015u_firmwarexeon_e-2274g_firmwareceleron_n2820core_i5-7300hqcore_i7-8706g_firmwarecore_i7-7560upentium_gold_g5420tcore_i3-6100hcore_i5-7400t_firmwarecore_i5-6200u_firmwarecore_i3-8100t_firmwarecore_i5-8259upentium_gold_4415y_firmwarexeon_e3-1535m_v6core_i9-9900celeron_j3355e_firmwarecore_i7-10510y_firmwarecore_i5-5257u_firmwareceleron_n2806pentium_gold_g5500atom_x5-e3940xeon_e-2146g_firmwarecore_i7-5850hq_firmwarecore_i7-8850h_firmwarecore_m7-6y75_firmwarecore_i7-6700hqcore_i3-9130ucore_i9-7900x_firmwarecore_i7-7800x_firmwarecore_i7-9850h_firmwarecore_i5-6350hqpentium_d1519core_i3-7100_firmwarecore_i5-7600tcore_i7-6660u_firmwareenterprise_linux_server_tuscore_i5-6350hq_firmwarexeon_e-2278g_firmwarecore_i7-7500ucore_i7-8550uxeon_e-2276ml_firmwareubuntu_linuxceleron_n3010xeon_e-2224gcore_i3-9100tceleron_j4025pentium_j4205xeon_e-2226gecore_i7-6650ucore_i9-9900x_firmwarecore_m-5y71core_i5-9300hcore_i3-7167u_firmwarecore_i7-8559u_firmwarecore_i9-10920x_firmwarecore_i7-8086k_firmwarecore_i5-1035g1_firmwarecore_i7-8665u_firmwarecore_i3-7167uxeon_e3-1585_v5_firmwarexeon_e-2176g_firmwarecore_i7-8500ycore_i5-9400hcore_i7-7567ucore_i9-9900tcore_i7-5557uceleron_g3900e_firmwarecore_i3-8145u_firmwarepentium_4405u_firmwareceleron_n3160_firmwarecore_i7-7660u_firmwarecore_i7-7820hqceleron_n2820_firmwarecore_i5-6260u_firmwarexeon_e3-1585l_v5core_i7-8750h_firmwarecore_i3-5010u_firmwarecore_i3-7300tatom_x7-e3950_firmwarecore_i5-7400_firmwarecore_i3-8300t_firmwarecore_i3-8109u_firmwareceleron_n3060_firmwareceleron_n3010_firmwarecore_i7-9700k_firmwarecore_i9-10980xe_firmwarepentium_a1020xeon_e-2288g_firmwareceleron_n4000celeron_n2830core_i5-7y54_firmwarexeon_e-2246g_firmwarepentium_4405y_firmwarecore_i7-6567uxeon_e-2176m_firmwarecore_i7-5775cxeon_e-2174g_firmwareceleron_n3450xeon_e3-1515m_v5core_i9-7900xceleron_n2805_firmwarecore_i9-8950hk_firmwarecore_i5-8500celeron_g3930_firmwarecore_i7-6870hq_firmwarecore_i5-7600_firmwarexeon_e3-1515m_v5_firmwareceleron_n2810core_i5-6267u_firmwarepentium_d1519_firmwareceleron_n2808_firmwarecore_i5-8265ucore_i5-6300hqxeon_e-2254mecore_i7-9750hcore_i5-6440hqcore_i7-7y75core_i3-5157u_firmwarepentium_gold_g5400t_firmwarepentium_gold_4410y_firmwarecore_i7-7560u_firmwarexeon_e-2286g_firmwarecore_i7-6700core_i3-5005u_firmwarecore_i5-7y57celeron_g3920_firmwarecore_i3-8350kcore_i5-7500tpentium_silver_j5040xeon_e3-1505m_v6core_i5-9600k_firmwarecore_i9-9900t_firmwarecore_i3-9100pentium_gold_g5500_firmwarexeon_e-2224g_firmwarepentium_gold_g5600xeon_e3-1578l_v5_firmwareceleron_j4125celeron_g4950_firmwarecore_i9-7920x_firmwarecore_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uceleron_j1750celeron_n2940_firmwarecore_i3-8300tcore_i7-7660ucore_i7-6600ucore_i3-6100u_firmwarecore_i7-8706gpentium_g4600txeon_e3-1565l_v5_firmwarepentium_gold_g5620_firmwarepentium_d1508_firmwarexeon_e3-1565l_v5xeon_e-2236core_i9-9880h_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarepentium_gold_4415u_firmwarexeon_e-2126g_firmwarecore_i9-7960x_firmwarecore_i7-8700core_i5-8259u_firmwarepentium_j3710_firmwareceleron_g3950core_i5-8400core_i7-8705g_firmwarepentium_3825u_firmwarecore_i3-7100tcore_i7-7700tceleron_n2930_firmwarecore_i7-8086kcore_i5-10210ucore_i5-7260u_firmwarepentium_gold_g5500t_firmwarecore_i7-6600u_firmwarecore_i5-7600k_firmwarecore_i7-6770hqcore_i7-8700kcore_m-5y10aceleron_n2940celeron_n2830_firmwarecore_i5-7200u_firmwarecore_i5-8600k_firmwarecore_i7-10510u_firmwarexeon_e-2134celeron_j3455core_i5-5350hxeon_e-2226g_firmwareceleron_n2807_firmwarepentium_d1509core_i5-10310y_firmwarecore_i7\+8700_firmwarexeon_e-2144g_firmwarecore_i7-10510ypentium_g4560t_firmwareceleron_j3160core_i5-7360u_firmwarecore_i3-10110uceleron_n3150_firmwarecore_i9-7960xcore_i5-9600kcore_i7-7820xceleron_g3900core_i5-5287u_firmwarecore_i7-7700hqcore_i9-7980xeceleron_g4900t_firmwarecore_i3-9100t_firmwarecore_i7-6870hqpentium_gold_4415ycore_i5-8350uceleron_n3050_firmwarecore_i3-1005g1_firmwareceleron_n4000_firmwarecore_i5-7300ucore_i5-6440hq_firmwarecore_m3-6y30_firmwarexeon_e3-1505l_v6_firmwareceleron_j3455_firmwareceleron_g3930core_i7-5600u_firmwarecore_i5-8500tceleron_g3930t_firmwarexeon_e-2246gcore_i5-7500celeron_n2806_firmwareceleron_n2910pentium_3825uceleron_j1800_firmwarecore_i5\+8400_firmwarecore_i5-5200u_firmwarecore_i5-7200ucore_i5-8350u_firmwarecore_i7-8700b_firmwareceleron_g3930ecore_i9-8950hkxeon_e3-1535m_v5_firmwarepentium_4405ucore_i7-6820hq_firmwarecore_i7-7920hqpentium_gold_g5600_firmwarecore_i9-9900ks_firmwarexeon_e-2254mlxeon_e3-1545m_v5core_i5-8400tcore_i3-9300_firmwarecore_i3-5015uceleron_g3930tpentium_d1508pentium_d1507_firmwarexeon_e3-1501m_v6_firmwarecore_i3-6100_firmwarecore_i9-10920xcore_m-5y51xeon_e-2254ml_firmwareceleron_j4105_firmwarexeon_e3-1578l_v5core_i7-6660ucore_i3-7350k_firmwarecore_i7-5775c_firmwarecore_i7-5500uceleron_g4920_firmwarepentium_3560m_firmwarepentium_silver_n5000core_i5-6500_firmwarecore_i3-7100hcore_i3-9300xeon_e-2276mlceleron_n3350e_firmwarexeon_e-2244gcore_i5\+8400core_i9-9900kxeon_e-2176gpentium_gold_g5400_firmwarecore_i7-8709gcore_i3-5020u_firmwarecore_i7-7y75_firmwarecore_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-6287ucore_i5-1035g7_firmwarepentium_silver_j5040_firmwareceleron_j4025_firmwareceleron_j1900core_i5-9400core_i9-9920xcore_i3-8100tcore_m3-8100y_firmwarecore_i7-5950hqcore_i5-6260ucore_i7-5650u_firmwarecore_i7-5550uatom_x5-e3930celeron_g4930_firmwarecore_i5-9500txeon_e-2278ge_firmwarecore_i5-7500t_firmwarecore_i7-6820hk_firmwarecore_i7-8700tcore_i7-6820hqceleron_g4930t_firmwarecore_i5-7400core_i7-8650uceleron_n2810_firmwarecore_m3-7y30_firmwarecore_i3-7320xeon_e-2286m_firmwarecore_i7-6700tcore_i7-6920hqcore_i7-9750h_firmwarecore_i3-6167u_firmwarepentium_gold_g4620_firmwarecore_i3-6100uceleron_j1850_firmwarepentium_gold_4415ucore_i7-6700_firmwarexeon_e-2234_firmwarecore_i5-1035g1pentium_silver_n5030core_i5-5250u_firmwarecore_i7-8565u_firmwarexeon_e-2186g_firmwareceleron_n2920_firmwarecore_i5-1035g4_firmwarecore_i3-10110y_firmwarecore_i5-8500bcore_i5-7600t_firmwarexeon_e-2124gceleron_n3050core_i5-8269ucore_i9-7980xe_firmwarecore_i5-7440hq_firmwarecore_i5-6300hq_firmwarexeon_e-2288gceleron_n3000core_m-5y10_firmwarexeon_e-2234core_i7-8709g_firmwareceleron_g3930e_firmwarepentium_a1020_firmwarecore_i7-9850hcore_i7-9700t_firmwareatom_x5-e3940_firmwareceleron_n4100_firmwarepentium_silver_j5005_firmwarecore_i7-7820x_firmwareceleron_g3900tpentium_d1507celeron_g3920core_i3-7100ucore_i5-10210y_firmwarecore_i5-5287ucore_i3-7350kcore_m-5y51_firmwarecore_i5-7600kcore_m5-6y57core_i5-8250uxeon_e-2126gcore_i7-6920hq_firmwarecore_i7-9700tcore_i3-7100t_firmwarecore_i5-7360uceleron_n3450_firmwarecore_i5-6500celeron_n2805core_i7-8650u_firmwareceleron_j1750_firmwarecore_i3-5157upentium_n3530_firmwarecore_i5-6200ucore_i9-9900k_firmwarecore_i7-7700k_firmwarecore_i7-6700hq_firmwarecore_m-5y70_firmwarecore_m3-8100ycore_i5-8250u_firmwarexeon_e-2186mcore_i7-7567u_firmwarecore_m-5y10c_firmwarecore_i3-7320_firmwarecore_i5-8400_firmwarepentium_gold_g4620celeron_n4120_firmwareceleron_g3902e_firmwarexeon_e-2176mcore_i7-6970hq_firmwarecore_i7-7700hq_firmwareceleron_n3350ecore_i7-6820hkpentium_g4400core_i9-9900xcore_i5-10310ycore_i5-8400t_firmwarexeon_e-2286gcore_i5-8365u_firmwareceleron_n2808core_i7-6700te_firmwarecore_i3-9300txeon_e-2244g_firmwarexeon_e3-1575m_v5core_i5-6360u_firmwarepentium_silver_n5030_firmwarexeon_e-2278gxeon_e3-1505l_v5core_i9-9980xeceleron_j3160_firmwarecore_i7-8850hceleron_j4005_firmwarecore_i5-8265u_firmwareceleron_j3060_firmwarecore_i5-5350ucore_i9-10900x_firmwarecore_i7-6560u_firmwarecore_i3-8300_firmwareceleron_g4930tceleron_n2920core_i9-9900_firmwarecore_i7-1065g7_firmwarexeon_e3-1505m_v6_firmwarecore_i9-10900xceleron_g3930te_firmwarexeon_e3-1545m_v5_firmwareceleron_n2815_firmwarecore_i5\+8500_firmwarecore_i7\+8700core_i9-10980xecore_i7-5700hqpentium_j4205_firmwarecore_m3-7y30core_i3-9350kcore_i5-8500_firmwareceleron_n4020_firmwarecore_i5-5300u_firmwarecore_i5-6300u_firmwarecore_i7-8809g_firmwareceleron_g4950core_i7-7700t_firmwarecore_i9-9980hk_firmwarepentium_4405ycore_i5-9400h_firmwareceleron_g4900core_i3-5010ucore_i5-8200ypentium_gold_g5400celeron_g3900t_firmwarecore_i3-6100xeon_e3-1505l_v5_firmwarecore_i3-10110u_firmwareceleron_n4020celeron_g4900_firmwarecore_i5-7440hqcore_i5-5350u_firmwarecore_i5-6360ucore_m5-6y54_firmwarexeon_e-2278gel_firmwarexeon_e-2144gcore_i5-9500t_firmwarecore_m5-6y57_firmwareceleron_g3900ecore_i7-7700_firmwarecore_i7-6770hq_firmwareceleron_g3950_firmwarecore_i7-5750hqcore_i5-6267uceleron_g3900teceleron_j3355_firmwarecore_i3-1005g1celeron_j4005core_i5-9600tcore_m-5y31core_i3-9320core_i9-9920x_firmwarecore_i5-8600tcore_i7-1065g7core_i5-9400t_firmwarecore_i9-9980hkcore_i5-8305gcore_i7-8559uceleron_n2910_firmwarecore_i7-9700_firmwarexeon_e-2146g2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux
CVE-2018-9568
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.48% / 64.03%
||
7 Day CHG~0.00%
Published-06 Dec, 2018 | 14:00
Updated-05 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.

Action-Not Available
Vendor-Google LLCLinux Kernel Organization, IncCanonical Ltd.Red Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxlinux_kernelenterprise_linux_server_eusandroidenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopAndroid
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CVE-2019-0211
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-7.8||HIGH
EPSS-86.24% / 99.36%
||
7 Day CHG~0.00%
Published-08 Apr, 2019 | 21:31
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-03||Apply updates per vendor instructions.

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

Action-Not Available
Vendor-The Apache Software FoundationOracle CorporationFedora ProjectNetApp, Inc.Red Hat, Inc.openSUSECanonical Ltd.Debian GNU/Linux
Product-openshift_container_platform_for_poweropenshift_container_platformenterprise_linuxenterprise_linux_update_services_for_sap_solutionscommunications_session_route_managerjboss_core_servicesubuntu_linuxdebian_linuxenterprise_linux_for_arm_64_eusenterprise_manager_ops_centerfedoraenterprise_linux_for_ibm_z_systems_eusleapsoftware_collectionsenterprise_linux_for_power_little_endianenterprise_linux_eusenterprise_linux_for_ibm_z_systemsenterprise_linux_server_ausenterprise_linux_for_arm_64instantis_enterprisetrackcommunications_session_report_managerhttp_serverretail_xstore_point_of_serviceenterprise_linux_for_power_little_endian_eusoncommand_unified_managerenterprise_linux_server_tusApache HTTP ServerHTTP Server
CWE ID-CWE-416
Use After Free
CVE-2018-9518
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.24%
||
7 Day CHG~0.00%
Published-07 Dec, 2018 | 23:00
Updated-05 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In nfc_llcp_build_sdreq_tlv of llcp_commands.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-73083945.

Action-Not Available
Vendor-Canonical Ltd.Google LLC
Product-androidubuntu_linuxAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-14896
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-2.58% / 84.98%
||
7 Day CHG~0.00%
Published-27 Nov, 2019 | 08:05
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.

Action-Not Available
Vendor-Fedora ProjectCanonical Ltd.Red Hat, Inc.Linux Kernel Organization, IncDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxlinux_kernelfedoraenterprise_linuxkernel
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-14814
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.25% / 48.49%
||
7 Day CHG~0.00%
Published-20 Sep, 2019 | 18:27
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.

Action-Not Available
Vendor-openSUSECanonical Ltd.Red Hat, Inc.Linux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-ubuntu_linuxa700s_firmwarea320_firmwareenterprise_linux_server_ausfas2720fas2720_firmwareh300s_firmwareh410c_firmwareh410sc190h610s_firmwareh300ssteelstore_cloud_integrated_storageh300e_firmwareh610sfas2750fas2750_firmwareh500ehci_management_nodeh500s_firmwareh500e_firmwareenterprise_linux_eusa700sa220h700sh700edata_availability_servicesleaph300ea800h500sservice_processorenterprise_linuxenterprise_linux_for_real_time_for_nfventerprise_linux_for_real_time_tusa320solidfirea800_firmwaredebian_linuxlinux_kernelh410s_firmwareh700s_firmwarec190_firmwarea220_firmwareh410centerprise_linux_server_tush700e_firmwareenterprise_linux_for_real_time_for_nfv_tusenterprise_linux_for_real_timemessaging_realtime_gridkernel
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9415
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.25%
||
7 Day CHG-0.00%
Published-06 Nov, 2018 | 17:00
Updated-16 Sep, 2024 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In driver_override_store and driver_override_show of bus.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-69129004 References: Upstream kernel.

Action-Not Available
Vendor-Canonical Ltd.Google LLC
Product-androidubuntu_linuxAndroid
CWE ID-CWE-415
Double Free
CVE-2018-9363
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.05% / 15.07%
||
7 Day CHG-0.00%
Published-06 Nov, 2018 | 17:00
Updated-16 Sep, 2024 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.

Action-Not Available
Vendor-Linux Kernel Organization, IncGoogle LLCDebian GNU/LinuxCanonical Ltd.
Product-androiddebian_linuxlinux_kernelubuntu_linuxAndroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2018-8822
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.42%
||
7 Day CHG~0.00%
Published-20 Mar, 2018 | 00:00
Updated-05 Aug, 2024 | 07:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-8781
Matching Score-8
Assigner-Check Point Software Ltd.
ShareView Details
Matching Score-8
Assigner-Check Point Software Ltd.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.47%
||
7 Day CHG~0.00%
Published-23 Apr, 2018 | 19:00
Updated-16 Sep, 2024 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.

Action-Not Available
Vendor-Check Point Software Technologies Ltd.Canonical Ltd.Red Hat, Inc.Debian GNU/LinuxLinux Kernel Organization, Inc
Product-enterprise_linux_serverubuntu_linuxdebian_linuxlinux_kernelenterprise_linux_workstationenterprise_linux_desktopLinux Kernel
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2018-7480
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.87%
||
7 Day CHG~0.00%
Published-25 Feb, 2018 | 20:00
Updated-05 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneln/a
CWE ID-CWE-415
Double Free
CVE-2018-7566
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.75%
||
7 Day CHG~0.00%
Published-30 Mar, 2018 | 21:00
Updated-05 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSUSEDebian GNU/LinuxRed Hat, Inc.Oracle CorporationCanonical Ltd.
Product-enterprise_linux_serverubuntu_linuxlinux_enterprise_module_for_public_cloudlinux_enterprise_serverdebian_linuxlinux_kernelenterprise_linux_server_eusenterprise_linux_server_ausenterprise_linux_workstationcommunications_eagle_application_processorenterprise_linux_server_tusenterprise_linux_desktopn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2018-6764
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.02%
||
7 Day CHG~0.00%
Published-23 Feb, 2018 | 17:00
Updated-05 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.

Action-Not Available
Vendor-n/aCanonical Ltd.Red Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxvirtualizationdebian_linuxenterprise_linux_workstationenterprise_linux_desktoplibvirtn/a
CWE ID-CWE-346
Origin Validation Error
CVE-2018-6927
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 25.22%
||
7 Day CHG~0.00%
Published-12 Feb, 2018 | 19:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.Red Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxlinux_kernelenterprise_linux_server_eusenterprise_linux_server_ausenterprise_linux_workstationvirtualization_hostenterprise_linux_server_tusenterprise_linux_desktopn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2019-13272
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-79.24% / 99.04%
||
7 Day CHG~0.00%
Published-17 Jul, 2019 | 12:32
Updated-30 Jul, 2025 | 01:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-06-10||Apply updates per vendor instructions.

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

Action-Not Available
Vendor-n/aCanonical Ltd.NetApp, Inc.Linux Kernel Organization, IncFedora ProjectRed Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_for_real_time_for_nfvubuntu_linuxhci_management_nodeh410csolidfireh610s_firmwareenterprise_linux_for_ibm_z_systemsdebian_linuxsteelstore_cloud_integrated_storageenterprise_linux_for_real_timeh410c_firmwareaff_a700senterprise_linux_for_real_time_for_nfv_tusenterprise_linux_for_real_time_tusaff_a700s_firmwareenterprise_linux_for_arm_64e-series_santricity_os_controllerservice_processoractive_iq_unified_managere-series_performance_analyzerhci_compute_nodeenterprise_linuxh610sfedoralinux_kerneln/aKernel
CVE-2018-6552
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.40%
||
7 Day CHG~0.00%
Published-31 May, 2018 | 22:00
Updated-17 Sep, 2024 | 03:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apport treats the container PID as the global PID when /proc/<global_pid>/ is missing

Apport does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers. The is_same_ns() function returns True when /proc/<global pid>/ does not exist in order to indicate that the crash should be handled in the global namespace rather than inside of a container. However, the portion of the data/apport code that decides whether or not to forward a crash to a container does not always replace sys.argv[1] with the value stored in the host_pid variable when /proc/<global pid>/ does not exist which results in the container pid being used in the global namespace. This flaw affects versions 2.20.8-0ubuntu4 through 2.20.9-0ubuntu7, 2.20.7-0ubuntu3.7, 2.20.7-0ubuntu3.8, 2.20.1-0ubuntu2.15 through 2.20.1-0ubuntu2.17, and 2.14.1-0ubuntu3.28.

Action-Not Available
Vendor-apport_projectn/aCanonical Ltd.
Product-apportubuntu_linuxApport
CVE-2018-5332
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.04%
||
7 Day CHG~0.00%
Published-11 Jan, 2018 | 07:00
Updated-05 Aug, 2024 | 05:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneln/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-20669
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.07%
||
7 Day CHG~0.00%
Published-18 Mar, 2019 | 16:33
Updated-05 Aug, 2024 | 12:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.

Action-Not Available
Vendor-n/aNetApp, Inc.Linux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kernelcn1610hci_management_nodecn1610_firmwaresnapprotectsolidfiren/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-20169
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 22.93%
||
7 Day CHG~0.00%
Published-17 Dec, 2018 | 06:00
Updated-05 Aug, 2024 | 11:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneln/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2018-15857
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.84%
||
7 Day CHG~0.00%
Published-25 Aug, 2018 | 21:00
Updated-05 Aug, 2024 | 10:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file.

Action-Not Available
Vendor-xkbcommonn/aCanonical Ltd.
Product-ubuntu_linuxlibxkbcommonxkbcommonn/a
CWE ID-CWE-416
Use After Free
CVE-2018-18653
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.54%
||
7 Day CHG~0.00%
Published-26 Oct, 2018 | 00:00
Updated-05 Aug, 2024 | 11:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Linux kernel, as used in Ubuntu 18.10 and when booted with UEFI Secure Boot enabled, allows privileged local users to bypass intended Secure Boot restrictions and execute untrusted code by loading arbitrary kernel modules. This occurs because a modified kernel/module.c, in conjunction with certain configuration options, leads to mishandling of the result of signature verification.

Action-Not Available
Vendor-n/aCanonical Ltd.
Product-ubuntu_linuxn/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2018-18445
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.47%
||
7 Day CHG~0.00%
Published-17 Oct, 2018 | 19:00
Updated-05 Aug, 2024 | 11:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncCanonical Ltd.Red Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxlinux_kernelenterprise_linux_server_eusenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-16882
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.11% / 30.10%
||
7 Day CHG~0.00%
Published-03 Jan, 2019 | 16:00
Updated-05 Aug, 2024 | 10:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions before 4.14.91 and before 4.19.13 are vulnerable.

Action-Not Available
Vendor-Linux Kernel Organization, IncThe Linux FoundationCanonical Ltd.
Product-ubuntu_linuxlinux_kernelkernel:
CWE ID-CWE-416
Use After Free
CVE-2018-15687
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-0.34% / 56.36%
||
7 Day CHG~0.00%
Published-26 Oct, 2018 | 14:00
Updated-09 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
systemd: chown_one() can dereference symlinks

A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239.

Action-Not Available
Vendor-systemd_projectsystemdCanonical Ltd.
Product-ubuntu_linuxsystemdsystemd
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2016-7425
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.50%
||
7 Day CHG~0.00%
Published-16 Oct, 2016 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncCanonical Ltd.
Product-linux_kernelubuntu_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-15686
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-7||HIGH
EPSS-1.99% / 82.86%
||
7 Day CHG~0.00%
Published-26 Oct, 2018 | 14:00
Updated-09 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
systemd: reexec state injection: fgets() on overlong lines leads to line splitting

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

Action-Not Available
Vendor-systemd_projectsystemdOracle CorporationCanonical Ltd.Debian GNU/Linux
Product-debian_linuxcommunications_cloud_native_core_network_function_cloud_native_environmentubuntu_linuxsystemdsystemd
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2018-16276
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.04%
||
7 Day CHG~0.00%
Published-31 Aug, 2018 | 16:00
Updated-05 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneln/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2016-6351
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.24% / 46.65%
||
7 Day CHG~0.00%
Published-07 Sep, 2016 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.

Action-Not Available
Vendor-n/aQEMUDebian GNU/LinuxCanonical Ltd.
Product-debian_linuxubuntu_linuxqemun/a
CVE-2018-14734
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 16.90%
||
7 Day CHG~0.00%
Published-29 Jul, 2018 | 16:00
Updated-05 Aug, 2024 | 09:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneln/a
CWE ID-CWE-416
Use After Free
CVE-2016-5829
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.41%
||
7 Day CHG~0.00%
Published-27 Jun, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxNovellCanonical Ltd.
Product-suse_linux_enterprise_real_time_extensiondebian_linuxlinux_kernelubuntu_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-14665
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.6||MEDIUM
EPSS-7.31% / 91.30%
||
7 Day CHG~0.00%
Published-25 Oct, 2018 | 20:00
Updated-05 Aug, 2024 | 09:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.X.Org FoundationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxorg-serverenterprise_linux_server_eusenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2016-5195
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7||HIGH
EPSS-94.18% / 99.91%
||
7 Day CHG~0.00%
Published-10 Nov, 2016 | 21:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

Action-Not Available
Vendor-n/aFedora ProjectPalo Alto Networks, Inc.Red Hat, Inc.NetApp, Inc.Linux Kernel Organization, IncCanonical Ltd.Debian GNU/Linux
Product-enterprise_linuxenterprise_linux_long_lifeoncommand_performance_managerlinux_kernelenterprise_linux_ausenterprise_linux_eushci_storage_nodesontap_select_deploy_administration_utilitysnapprotectdebian_linuxpan-ossolidfirecloud_backuponcommand_balancefedoraubuntu_linuxenterprise_linux_tusoncommand_unified_manager_for_clustered_data_ontapn/aKernel
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 8
  • 9
  • Next
Details not found