Show filters
130 Total Results
Displaying 1-10 of 130
Sort by:
Attacker Value
Unknown
CVE-2016-8451
Disclosure Date: January 12, 2017 (last updated November 25, 2024)
An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.4. Android ID: A-32178033.
0
Attacker Value
Unknown
CVE-2016-7039
Disclosure Date: October 16, 2016 (last updated November 25, 2024)
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
0
Attacker Value
Unknown
CVE-2016-5696
Disclosure Date: August 06, 2016 (last updated November 25, 2024)
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
0
Attacker Value
Unknown
CVE-2016-6197
Disclosure Date: August 06, 2016 (last updated November 25, 2024)
fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.
0
Attacker Value
Unknown
CVE-2016-6198
Disclosure Date: August 06, 2016 (last updated November 25, 2024)
The filesystem layer in the Linux kernel before 4.5.5 proceeds with post-rename operations after an OverlayFS file is renamed to a self-hardlink, which allows local users to cause a denial of service (system crash) via a rename system call, related to fs/namei.c and fs/open.c.
0
Attacker Value
Unknown
CVE-2016-4470
Disclosure Date: June 27, 2016 (last updated November 25, 2024)
The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
0
Attacker Value
Unknown
CVE-2016-2117
Disclosure Date: May 02, 2016 (last updated November 25, 2024)
The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.
0
Attacker Value
Unknown
CVE-2015-2150
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
0
Attacker Value
Unknown
CVE-2014-8133
Disclosure Date: December 17, 2014 (last updated October 05, 2023)
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
0
Attacker Value
Unknown
CVE-2014-3645
Disclosure Date: November 10, 2014 (last updated October 05, 2023)
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
0