Vulnerabilities > Linux > Linux Kernel > 2.6.39
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-10-03 | CVE-2018-17972 | Race Condition vulnerability in multiple products An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. | 5.5 |
2018-09-25 | CVE-2018-14634 | Integer Overflow or Wraparound vulnerability in multiple products An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. | 7.8 |
2018-09-21 | CVE-2018-16597 | Incorrect Authorization vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 4.8. | 4.9 |
2018-09-11 | CVE-2018-10853 | Improper Privilege Management vulnerability in multiple products A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. | 4.6 |
2018-09-07 | CVE-2018-16658 | Information Exposure vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 4.18.6. | 3.6 |
2018-09-04 | CVE-2018-6555 | Use After Free vulnerability in Linux Kernel The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket. | 7.2 |
2018-09-04 | CVE-2018-6554 | Missing Release of Resource after Effective Lifetime vulnerability in Linux Kernel Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket. | 4.9 |
2018-08-31 | CVE-2018-16276 | Out-of-bounds Write vulnerability in multiple products An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. | 7.8 |
2018-08-20 | CVE-2018-15594 | Information Exposure vulnerability in multiple products arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests. | 2.1 |
2018-08-20 | CVE-2018-15572 | The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks. | 2.1 |