[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:703395
linux: Linux kernel The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703394
linux-ti-omap4: Linux kernel for OMAP4 The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703393
linux-raspi2: Linux kernel for Raspberry Pi 2 The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703391
linux: Linux kernel The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:38255
A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capab ...

oval:org.secpod.oval:def:38256
A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capab ...

oval:org.secpod.oval:def:703389
linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703388
linux: Linux kernel The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703387
linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise The system could be made to run programs as an administrator.

oval:org.secpod.oval:def:38253
The host is installed with Linux kernel on RHEL 7 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a race condition in packet_set_ring leads. Successful exploitation could allow attackers to elevate their privileges on the system.

oval:org.secpod.oval:def:38254
The host is installed with kernel on Centos 7 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a race condition in packet_set_ring leads. Successful exploitation could allow attackers to elevate their privileges on the system.

oval:org.secpod.oval:def:204452
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * Linux kernel built with the Kernel-based Virtual Machine support is vulnerable to a null pointer dereference flaw. It could occur on x86 platform, when emulating an undefined instruction. An attack ...

oval:org.secpod.oval:def:89045161
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive critical security fixes. The following security bugs were fixed: - CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges . - CVE-2016-8632: The t ...

oval:org.secpod.oval:def:111741
The kernel meta package

oval:org.secpod.oval:def:703396
linux-raspi2: Linux kernel for Raspberry Pi 2 The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:1501728
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:703392
linux: Linux kernel The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703390
linux-snapdragon: Linux kernel for Snapdragon Processors The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:1501790
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:501987
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * Linux kernel built with the Kernel-based Virtual Machine support is vulnerable to a null pointer dereference flaw. It could occur on x86 platform, when emulating an undefined instruction. An attack ...

oval:org.secpod.oval:def:52825
linux: Linux kernel The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:1501731
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:52824
linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:1501735
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1501733
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1600479
CVE-2016-8645 kernel: a BUG statement can be hit in net/ipv4/tcp_input.cIt was discovered that the Linux kernel since 3.6-rc1 with net.ipv4.tcp_fastopen; set to 1 can hit BUG statement in tcp_collapse function after making a number of certain syscalls leading to a possible system crash.CVE-2016-8655 ...

oval:org.secpod.oval:def:51686
linux-snapdragon: Linux kernel for Snapdragon Processors The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:51688
linux-raspi2: Linux kernel for Raspberry Pi 2 The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:51687
linux: Linux kernel The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:1501788
Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support is vulnerable to a null pointer dereference flaw. It could occur on x86 platform, when emulating an undefined instruction. An attacker could use this flaw to crash the host kernel resulting in DoS. (CVE-2016-8630) * A race ...

CWE    1
CWE-362
*CVE
CVE-2016-8655

© SecPod Technologies