Vulnerability knowledge base

2024


A new variant of the previously-disclosed BHI (also known as Spectre v2) vulnerabilities was discovered to affected certain Intel CPUs. The new publication shows that attacks are possible using vectors other than eBPF, leading to...

Published 24/04/2024

2023


It was discovered that some Intel processors were vulnerable to information exposure in certain vector (AVX) operations.

Published 24/08/2023

2022


Multiple issues were discovered in AMD and Intel CPUs that result in information disclosure under mitigations for the Spectre Variant 2 vulnerability.

Published 12/07/2022


It was discovered that readable files could be overwritten at the page cache level unintentionally or by a malicious actor. That includes files that the process did not have write access to, were immutable or were on read-only filesystems.

Published 10/03/2022


It was discovered that CPU internals can be abused by an unprivileged process to lead to information disclosure.

Published 08/03/2022

2021


A zero-day vulnerability was discovered in Apache Log4j 2, a Java logging framework, that allows for arbitrary code execution through the exploitation of requests to attacker-controlled LDAP and other JNDI endpoints.

Published 09/12/2021


Several vulnerabilities have been identified in GRUB2 that allow UEFI Secure Boot protections to be bypassed by a local attacker with administrative privileges (root) or physical access. These are different from the previously...

Published 02/03/2021

2020


Several vulnerabilities have been identified that affect the Linux kernel on Intel hosts through power side-channel attacks that allow information to be disclosed to non-privileged processes.

Published 10/11/2020


Several vulnerabilities have been identified in GRUB2 that allow UEFI Secure Boot protections to be bypassed by a local attacker with administrative privileges (root) or physical access.

Published 29/07/2020


A vulnerability was discovered affecting selected Intel CPUs that could allow a local attacker to expose the memory of processes running on the same CPU as the malicious code.

Published 09/06/2020

2019


Several vulnerabilities have been identified in Intel CPUs and graphics cards that allow a local attacker to expose memory across security boundaries (similar to MDS), cause Denial of Service attacks, or escalate privileges.

Published 12/11/2019


 Fixed

Published 13/08/2019

Several vulnerabilities were discovered in multiple implementations of the HTTP/2 transport protocol that allow a remote attacker to mount Denial of Service attacks.

Published 13/08/2019


A Kubernetes vulnerability has been identified where the API server mistakenly allows access to a cluster-scoped custom resource, when the requesting user has restricted access to namespaced resources.

Published 05/08/2019


Several vulnerabilities were discovered in the Linux kernel’s implementation of TCP that allow a remote attacker to cause a Denial of Service attack.

Published 17/06/2019


A vulnerability was discovered in Intel CPUs that allow a local attacker to access data belonging to another process or data that originated from a different security context. As a result, unintended memory exposure can occur...

Published 14/05/2019


 Fixed

Published 12/02/2019

A vulnerability was discovered in snapd that allow local privilege escalation attacks to be executed.

Published 12/02/2019


It was discovered that a vulnerability affecting the runC container runtime can allow an attacker to gain root privileges on the host from inside a privileged container.

Published 11/02/2019

2018


A vulnerability was discovered that allows a local attacker to extract memory associated to other processes from the L1 cache.

Published 14/08/2018


Guidance available

Published 27/07/2018

A side channel attack was discovered against applications previously assumed to be immune to the Spectre vulnerability that can be used to read the contents of memory across a network.

Published 27/07/2018


It was discovered that systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and...

Published 10/07/2018


 Fixed

Published 13/06/2018

A side channel attack was discovered that leaks certain register values between processes.

Published 13/06/2018


A variant of a cache speculation timing side channel attack was discovered, similar to the issues previously disclosed under the names Spectre and Meltdown.

Published 21/05/2018


A vulnerability was discovered in the Linux kernel that could be exploited by a local attacker to cause a denial of service (system crash). This issue only affected the amd64 architecture.

Published 08/05/2018

2017


Two issues were discovered affecting the Bluetooth subsystem: an information disclosure in the BlueZ daemon and a kernel stack-based buffer overflow that can cause denial of service through a system crash, both of which a...

Published 12/09/2017

2016


 Fixed

Published 18/07/2016

It was discovered that certain CGI environments had a vulnerability related to the processing of the Proxy header.

Published 18/07/2016


Two vulnerabilities were discovered in the OpenSSH client that could be exploited by a malicious SSH server to disclose private data (including private keys) or overwrite certain areas of the client’s memory.

Published 14/01/2016

2015


The Android stagefright vulnerability allows for a remote attacker to send a crafted MMS message to a victim’s phone to steal data, access hardware and install malware. Ubuntu Touch does not expose the affected functionality of...

Published 29/07/2015


 Fixed

Published 21/05/2015

Cryptanalysis has shown that the use of shared parameters and short key sizes makes Diffie-Hellman exchange subceptible to compromise.

Published 21/05/2015


 Fixed

Published 13/05/2015

It was discovered that a buffer overflow existed in the virtual floppy disk controller of QEMU. An attacker could use this issue to cause QEMU to crash or execute arbitrary code in the host’s QEMU process.

Published 13/05/2015


 Fixed

Published 27/01/2015

It was discovered that a buffer overflow existed in a GNU C Library function. An attacker could use this issue to execute arbitrary code or cause an application crash, resulting in a denial of service.

Published 27/01/2015