Логотип exploitDog
bind:"CVE-2019-15239" OR bind:"CVE-2019-14821"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-15239" OR bind:"CVE-2019-14821"

Количество 45

Количество 45

oracle-oval логотип

ELSA-2019-3979

больше 5 лет назад

ELSA-2019-3979: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4808

больше 5 лет назад

ELSA-2019-4808: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2019-15239

почти 6 лет назад

In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2019-15239

почти 6 лет назад

In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2019-15239

почти 6 лет назад

In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2019-15239

почти 6 лет назад

In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2019-14821

почти 6 лет назад

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2019-14821

почти 6 лет назад

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2019-14821

почти 6 лет назад

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2019-14821

почти 6 лет назад

An out-of-bounds access issue was found in the Linux kernel, all versi ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-7j8w-38v5-7qqp

около 3 лет назад

In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.

EPSS: Низкий
fstec логотип

BDU:2020-00235

почти 6 лет назад

Уязвимость компонента net/ipv4/tcp_output.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-5xg6-r8mx-769h

около 3 лет назад

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

CVSS3: 8.8
EPSS: Низкий
oracle-oval логотип

ELSA-2019-4800

почти 6 лет назад

ELSA-2019-4800: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4799

почти 6 лет назад

ELSA-2019-4799: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4256

больше 5 лет назад

ELSA-2019-4256: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2019-04677

почти 6 лет назад

Уязвимость функции Coalesced_MMIO ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2651-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2648-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2756-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2019-3979

ELSA-2019-3979: kernel security and bug fix update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2019-4808

ELSA-2019-4808: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 5 лет назад
ubuntu логотип
CVE-2019-15239

In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-15239

In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.

CVSS3: 7.4
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-15239

In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-15239

In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was ...

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-14821

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-14821

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

CVSS3: 7
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-14821

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-14821

An out-of-bounds access issue was found in the Linux kernel, all versi ...

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
github логотип
GHSA-7j8w-38v5-7qqp

In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.

0%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-00235

Уязвимость компонента net/ipv4/tcp_output.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
github логотип
GHSA-5xg6-r8mx-769h

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

CVSS3: 8.8
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2019-4800

ELSA-2019-4800: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 6 лет назад
oracle-oval логотип
ELSA-2019-4799

ELSA-2019-4799: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 6 лет назад
oracle-oval логотип
ELSA-2019-4256

ELSA-2019-4256: kernel security and bug fix update (IMPORTANT)

больше 5 лет назад
fstec логотип
BDU:2019-04677

Уязвимость функции Coalesced_MMIO ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2651-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2648-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2756-1

Security update for the Linux Kernel

больше 5 лет назад

Уязвимостей на страницу