Vulnerabilities > Linux > Linux Kernel > 2.1.47
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-12-28 | CVE-2016-6787 | Permissions, Privileges, and Access Controls vulnerability in Linux Kernel kernel/events/core.c in the performance subsystem in the Linux kernel before 4.0 mismanages locks during certain migrations, which allows local users to gain privileges via a crafted application, aka Android internal bug 31095224. | 7.0 |
2016-12-28 | CVE-2016-6786 | Permissions, Privileges, and Access Controls vulnerability in Linux Kernel kernel/events/core.c in the performance subsystem in the Linux kernel before 4.0 mismanages locks during certain migrations, which allows local users to gain privileges via a crafted application, aka Android internal bug 30955111. | 7.0 |
2016-12-28 | CVE-2016-6213 | Resource Exhaustion vulnerability in Linux Kernel fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts. | 4.7 |
2016-12-28 | CVE-2012-6704 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Linux Kernel The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option. | 7.8 |
2016-12-08 | CVE-2015-8967 | Permissions, Privileges, and Access Controls vulnerability in multiple products arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access. | 7.8 |
2016-12-08 | CVE-2015-8966 | Permissions, Privileges, and Access Controls vulnerability in Linux Kernel arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 4.4 allows local users to gain privileges via a crafted (1) F_OFD_GETLK, (2) F_OFD_SETLK, or (3) F_OFD_SETLKW command in an fcntl64 system call. | 7.2 |
2016-11-28 | CVE-2016-9191 | Improper Input Validation vulnerability in Linux Kernel The cgroup offline implementation in the Linux kernel through 4.8.11 mishandles certain drain operations, which allows local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application, as demonstrated by trinity. | 4.9 |
2016-11-28 | CVE-2016-9178 | Information Exposure vulnerability in Linux Kernel The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel before 4.7.5 does not initialize a certain integer variable, which allows local users to obtain sensitive information from kernel stack memory by triggering failure of a get_user_ex call. | 2.1 |
2016-11-28 | CVE-2016-9084 | Integer Overflow or Wraparound vulnerability in Linux Kernel drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file. | 4.6 |
2016-11-28 | CVE-2016-8650 | Resource Management Errors vulnerability in Linux Kernel The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent. | 5.5 |