Loading HuntDB...

The Linux Foundation

3 Products 19 CVEs

CVE Severity Distribution (All Time)

Critical
0
High
3
Medium
11
Low
0

Timeline Overview

Last 30 Days 0 CVEs
Last 6 Months 0 CVEs
Last Year 0 CVEs

Recent CVEs

View all
CVE-2020-10751 MEDIUM 5 years, 1 month ago

A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain…

CVE-2019-1010234 UNKNOWN 5 years, 11 months ago

The Linux Foundation ONOS 1.15.0 and ealier is affected by: Improper Input Validation. The impact is: The attacker can remotely execute any commands …

CVE-2019-1010245 UNKNOWN 5 years, 11 months ago

The Linux Foundation ONOS SDN Controller 1.15 and earlier versions is affected by: Improper Input Validation. The impact is: A remote attacker can ex…

CVE-2019-1010249 UNKNOWN 5 years, 11 months ago

The Linux Foundation ONOS 2.0.0 and earlier is affected by: Integer Overflow. The impact is: A network administrator (or attacker) can install uninte…

CVE-2019-1010250 UNKNOWN 5 years, 11 months ago

The Linux Foundation ONOS 2.0.0 and earlier is affected by: Poor Input-validation. The impact is: A network administrator (or attacker) can install u…

CVE-2019-1010252 UNKNOWN 5 years, 11 months ago

The Linux Foundation ONOS 2.0.0 and earlier is affected by: Poor Input-validation. The impact is: A network administrator (or attacker) can install u…

CVE-2019-3896 HIGH 6 years ago

A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a priv…

CVE-2019-3882 MEDIUM 6 years, 2 months ago

A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound t…

CVE-2019-3901 MEDIUM 6 years, 2 months ago

A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cre…

CVE-2019-3837 MEDIUM 6 years, 2 months ago

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded user…