Vulnerabilities > Linux > Linux Kernel > 5.2.19
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-10-01 | CVE-2019-17052 | Incorrect Default Permissions vulnerability in multiple products ax25_create in net/ax25/af_ax25.c in the AF_AX25 network module in the Linux kernel 3.16 through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-0614e2b73768. | 3.3 |
2019-09-24 | CVE-2019-16746 | Classic Buffer Overflow vulnerability in multiple products An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. | 9.8 |
2019-08-19 | CVE-2018-20976 | Use After Free vulnerability in Linux Kernel An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. | 7.8 |
2019-08-19 | CVE-2016-10905 | Use After Free vulnerability in Linux Kernel An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. | 7.8 |
2019-08-16 | CVE-2019-15099 | NULL Pointer Dereference vulnerability in multiple products drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor. | 7.5 |
2019-07-26 | CVE-2018-20854 | Out-of-bounds Read vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 4.20. | 7.8 |
2019-04-22 | CVE-2019-3901 | Improper Locking vulnerability in multiple products A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. | 4.7 |
2019-04-09 | CVE-2019-3887 | Incorrect Authorization vulnerability in multiple products A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. | 5.6 |
2018-12-17 | CVE-2018-20169 | Resource Exhaustion vulnerability in multiple products An issue was discovered in the Linux kernel before 4.19.9. | 6.8 |
2018-10-08 | CVE-2018-14656 | Improper Input Validation vulnerability in Linux Kernel A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log. | 5.5 |