A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.2.8. Affected is an unknown function of the file drivers/net/wireless/ath/ath10k/usb.c of the component Endpoint Descriptor Handler. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2019-15099. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability has been found in Linux Kernel up to 5.0.18 and classified as critical. This vulnerability affects the function __xfrm_policy_unlink of the file net/xfrm/xfrm_user.c of the component Array Access. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2019-15666. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.3.8. It has been declared as problematic. This vulnerability affects unknown code of the file kernel/sched/fair.c of the component Slice Handler. The manipulation leads to resource consumption.
This vulnerability was named CVE-2019-19922. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.2.14 on PowerPC. Affected is an unknown function of the file arch/powerpc/kernel/process.c. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2019-15031. The attack needs to be approached locally. There is no exploit available.
A vulnerability was found in Ipa up to 4.6.6/4.7.3/4.8.2. It has been classified as critical. This affects the function ber_scanf of the component Kerberos Key Data Parser. The manipulation leads to resource consumption.
This vulnerability is uniquely identified as CVE-2019-14867. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 3.x/4.17.x. Affected by this vulnerability is an unknown functionality of the component Marvell Wifi Chip Driver. The manipulation leads to heap-based buffer overflow.
This vulnerability is known as CVE-2019-14895. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 3.x/4.17.x. This affects an unknown part of the component Marvell Wifi Chip Driver. The manipulation leads to resource consumption.
This vulnerability is uniquely identified as CVE-2019-14901. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ipa up to 4.6.6/4.7.3/4.8.2 and classified as problematic. Affected by this issue is some unknown functionality of the component Batch Processing. The manipulation leads to information disclosure (Password).
This vulnerability is handled as CVE-2019-10195. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.9. It has been declared as critical. Affected by this vulnerability is the function ctx_list/ucma_migrate_id of the file drivers/infiniband/core/ucma.c. The manipulation leads to use after free.
This vulnerability is known as CVE-2020-36385. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.