| Reference | Source | Link | Tags |
|---|
| cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.27 |
MISC |
cdn.kernel.org |
Mailing List, Patch, Vendor Advisory |
| cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.105 |
MISC |
cdn.kernel.org |
Mailing List, Patch, Vendor Advisory |
| Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem - Linux dos Exploit |
EXPLOIT-DB |
www.exploit-db.com |
Exploit, Third Party Advisory, VDB Entry |
| USN-3932-2: Linux kernel (Xenial HWE) vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| mm: enforce min addr even if capable() in expand_downwards() · torvalds/linux@0a1d529 · GitHub |
MISC |
github.com |
Mailing List, Patch, Vendor Advisory |
| [SECURITY] [DLA 1731-2] linux regression update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| USN-3930-1: Linux kernel vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| USN-3930-2: Linux kernel (HWE) vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| Linux kernel CVE-2019-9213 Local Denial of Service Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| [security-announce] openSUSE-SU-2019:1085-1: important: Security update |
SUSE |
lists.opensuse.org |
Mailing List, Third Party Advisory |
| [SECURITY] [DLA 1771-1] linux-4.9 security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| USN-3932-1: Linux kernel vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| USN-3933-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| Reliable Datagram Sockets (RDS) rds_atomic_free_op Privilege Escalation ≈ Packet Storm |
MISC |
packetstormsecurity.com |
|
| USN-3931-1: Linux kernel vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| [SECURITY] [DLA 1731-1] linux security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| USN-3931-2: Linux kernel (HWE) vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| USN-3933-1: Linux kernel vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.162 |
MISC |
cdn.kernel.org |
Mailing List, Patch, Vendor Advisory |
| [security-announce] openSUSE-SU-2019:1193-1: important: Security update |
SUSE |
lists.opensuse.org |
Mailing List, Third Party Advisory |
| cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.14 |
MISC |
cdn.kernel.org |
Mailing List, Patch, Vendor Advisory |
| kernel/git/torvalds/linux.git - Linux kernel source tree |
MISC |
git.kernel.org |
Patch, Vendor Advisory |
| 1792 -
project-zero -
Project Zero -
Monorail |
MISC |
bugs.chromium.org |
Exploit, Mailing List, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |