Vulnerabilities > Linux > Linux Kernel > 4.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-05-02 | CVE-2015-8839 | Race Condition vulnerability in multiple products Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service (disk corruption) by writing to a page that is associated with a different user's file after unsynchronized hole punching and page-fault handling. | 5.1 |
2016-05-02 | CVE-2015-8830 | Unspecified vulnerability in Linux Kernel 4.0 Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec. | 7.8 |
2016-05-02 | CVE-2015-8746 | Unspecified vulnerability in Linux Kernel fs/nfs/nfs4proc.c in the NFS client in the Linux kernel before 4.2.2 does not properly initialize memory for migration recovery operations, which allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) via crafted network traffic. | 7.5 |
2016-05-02 | CVE-2015-4178 | Unspecified vulnerability in Linux Kernel The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency of a certain list data structure, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call, related to fs/fs_pin.c and include/linux/fs_pin.h. | 5.5 |
2016-05-02 | CVE-2015-4177 | Unspecified vulnerability in Linux Kernel The collect_mounts function in fs/namespace.c in the Linux kernel before 4.0.5 does not properly consider that it may execute after a path has been unmounted, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call. | 5.5 |
2016-05-02 | CVE-2015-4176 | Information Exposure vulnerability in Linux Kernel fs/namespace.c in the Linux kernel before 4.0.2 does not properly support mount connectivity, which allows local users to read arbitrary files by leveraging user-namespace root access for deletion of a file or directory. | 5.5 |
2016-05-02 | CVE-2014-9717 | Improper Access Control vulnerability in Linux Kernel fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace. | 6.1 |
2016-04-27 | CVE-2016-3672 | 7PK - Security Features vulnerability in multiple products The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits. | 7.8 |
2016-04-27 | CVE-2016-3156 | Resource Management Errors vulnerability in multiple products The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses. | 5.5 |
2016-04-27 | CVE-2016-3134 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call. | 8.4 |