- Home
- CVEs with nessus.description==It+was+discovered+that+the+Linux+kernel+did+not+properly+initialize+a+Wake-+on-Lan+data+structure.+A+local+attacker+could+use+this+to+expose+sensitive+information+%28kernel+memory%29.+%28CVE-2014-9900%29%0A%0AIt+was+discovered+that+the+Linux+kernel+did+not+properly+restrict+access+to+%2Fproc%2Fiomem.+A+local+attacker+could+use+this+to+expose+sensitive+information.+%28CVE-2015-8944%29%0A%0AIt+was+discovered+that+a+use-after-free+vulnerability+existed+in+the+performance+events+and+counters+subsystem+of+the+Linux+kernel+for+ARM64.+A+local+attacker+could+use+this+to+cause+a+denial+of+service+%28system+crash%29+or+possibly+execute+arbitrary+code.+%28CVE-2015-8955%29%0A%0AIt+was+discovered+that+the+SCSI+generic+%28sg%29+driver+in+the+Linux+kernel+contained+a+double-free+vulnerability.+A+local+attacker+could+use+this+to+cause+a+denial+of+service+%28system+crash%29.+%28CVE-2015-8962%29%0A%0ASasha+Levin+discovered+that+a+race+condition+existed+in+the+performance+events+and+counters+subsystem+of+the+Linux+kernel+when+handling+CPU+unplug+events.+A+local+attacker+could+use+this+to+cause+a+denial+of+service+%28system+crash%29+or+possibly+execute+arbitrary+code.%0A%28CVE-2015-8963%29%0A%0ATilman+Schmidt+and+Sasha+Levin+discovered+a+use-after-free+condition+in+the+TTY+implementation+in+the+Linux+kernel.+A+local+attacker+could+use+this+to+expose+sensitive+information+%28kernel+memory%29.%0A%28CVE-2015-8964%29%0A%0AIt+was+discovered+that+the+fcntl64%28%29+system+call+in+the+Linux+kernel+did+not+properly+set+memory+limits+when+returning+on+32-bit+ARM+processors.+A+local+attacker+could+use+this+to+gain+administrative+privileges.+%28CVE-2015-8966%29%0A%0AIt+was+discovered+that+the+system+call+table+for+ARM+64-bit+processors+in+the+Linux+kernel+was+not+write-protected.+An+attacker+could+use+this+in+conjunction+with+another+kernel+vulnerability+to+execute+arbitrary+code.+%28CVE-2015-8967%29%0A%0AIt+was+discovered+that+the+generic+SCSI+block+layer+in+the+Linux+kernel+did+not+properly+restrict+write+operations+in+certain+situations.+A+local+attacker+could+use+this+to+cause+a+denial+of+service+%28system+crash%29+or+possibly+gain+administrative+privileges.%0A%28CVE-2016-10088%29%0A%0AAlexander+Potapenko+discovered+a+race+condition+in+the+Advanced+Linux+Sound+Architecture+%28ALSA%29+subsystem+in+the+Linux+kernel.+A+local+attacker+could+use+this+to+expose+sensitive+information+%28kernel+memory%29.+%28CVE-2017-1000380%29%0A%0ALi+Qiang+discovered+that+the+DRM+driver+for+VMware+Virtual+GPUs+in+the+Linux+kernel+did+not+properly+validate+some+ioctl+arguments.+A+local+attacker+could+use+this+to+cause+a+denial+of+service+%28system+crash%29.%0A%28CVE-2017-7346%29%0A%0ATuomas+Haanpaa+and+Ari+Kauppi+discovered+that+the+NFSv2+and+NFSv3+server+implementations+in+the+Linux+kernel+did+not+properly+check+for+the+end+of+buffer.+A+remote+attacker+could+use+this+to+craft+requests+that+cause+a+denial+of+service+%28system+crash%29+or+possibly+execute+arbitrary+code.+%28CVE-2017-7895%29%0A%0AIt+was+discovered+that+an+integer+underflow+existed+in+the+Edgeport+USB+Serial+Converter+device+driver+of+the+Linux+kernel.+An+attacker+with+physical+access+could+use+this+to+expose+sensitive+information+%28kernel+memory%29.+%28CVE-2017-8924%29%0A%0AIt+was+discovered+that+the+USB+ZyXEL+omni.net+LCD+PLUS+driver+in+the+Linux+kernel+did+not+properly+perform+reference+counting.+A+local+attacker+could+use+this+to+cause+a+denial+of+service+%28tty+exhaustion%29.%0A%28CVE-2017-8925%29%0A%0AMurray+McAllister+discovered+that+the+DRM+driver+for+VMware+Virtual+GPUs+in+the+Linux+kernel+did+not+properly+initialize+memory.+A+local+attacker+could+use+this+to+expose+sensitive+information+%28kernel+memory%29.+%28CVE-2017-9605%29.%0A%0ANote+that+Tenable+Network+Security+has+extracted+the+preceding+description+block+directly+from+the+Ubuntu+security+advisory.+Tenable+has+attempted+to+automatically+clean+and+format+it+as+much+as+possible+without+introducing+additional+issues
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top