The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Noyau Linux

Linux kernel: denial of service via fdatasync
An attacker can generate a fatal error via fdatasync() on the Linux kernel, in order to trigger a denial of service...
CVE-2016-8660, VIGILANCE-VUL-20869
Linux kernel: buffer overflow via proc_keys_show
An attacker can generate a buffer overflow via proc_keys_show() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
1373499, 2011746, CERTFR-2016-AVI-378, CERTFR-2016-AVI-426, CERTFR-2017-AVI-001, CERTFR-2017-AVI-016, CERTFR-2017-AVI-034, CERTFR-2017-AVI-053, CERTFR-2017-AVI-054, CERTFR-2017-AVI-131, CERTFR-2017-AVI-287, CVE-2016-7042, DLA-670-1, DSA-3696-1, openSUSE-SU-2016:3021-1, openSUSE-SU-2016:3050-1, openSUSE-SU-2016:3058-1, openSUSE-SU-2016:3061-1, RHSA-2017:0817-01, RHSA-2017:1842-01, RHSA-2017:2077-01, RHSA-2017:2669-01, SUSE-SU-2016:2912-1, SUSE-SU-2016:2976-1, SUSE-SU-2016:3304-1, SUSE-SU-2017:0181-1, SUSE-SU-2017:0333-1, SUSE-SU-2017:0471-1, SUSE-SU-2017:0494-1, SUSE-SU-2017:1102-1, USN-3126-1, USN-3126-2, USN-3127-1, USN-3127-2, USN-3128-1, USN-3128-2, USN-3128-3, USN-3129-1, USN-3129-2, USN-3161-1, USN-3161-2, USN-3161-3, USN-3161-4, VIGILANCE-VUL-20868
Linux kernel: denial of service via GRO
An attacker can send malicious GRO packets to the Linux kernel, in order to trigger a denial of service...
CERTFR-2016-AVI-334, CERTFR-2016-AVI-402, CERTFR-2017-AVI-016, CVE-2016-7039, openSUSE-SU-2016:2583-1, RHSA-2016:2047-01, RHSA-2016:2110-01, SA134, SUSE-SU-2017:0181-1, USN-3098-1, USN-3098-2, USN-3099-1, USN-3099-2, USN-3099-3, USN-3099-4, VIGILANCE-VUL-20813
Linux kernel: use after free via recvmmsg
An attacker can force the usage of a freed memory area via an application using recvmmsg() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2016-AVI-378, CERTFR-2017-AVI-034, CERTFR-2017-AVI-054, CERTFR-2017-AVI-060, CERTFR-2017-AVI-131, CERTFR-2017-AVI-162, CERTFR-2017-AVI-282, CVE-2016-7117, DSA-3659-1, openSUSE-SU-2016:2625-1, openSUSE-SU-2017:0456-1, openSUSE-SU-2017:0458-1, RHSA-2016:2962-01, RHSA-2017:0031-01, RHSA-2017:0036-01, RHSA-2017:0065-01, RHSA-2017:0086-01, RHSA-2017:0091-01, RHSA-2017:0113-01, RHSA-2017:0196-01, RHSA-2017:0215-01, RHSA-2017:0216-01, RHSA-2017:0217-01, RHSA-2017:0270-01, SUSE-SU-2016:2976-1, SUSE-SU-2017:0333-1, SUSE-SU-2017:0494-1, SUSE-SU-2017:0575-1, SUSE-SU-2017:1102-1, SUSE-SU-2017:1247-1, SUSE-SU-2017:1360-1, SUSE-SU-2017:1990-1, SUSE-SU-2017:2342-1, USN-3126-1, USN-3126-2, VIGILANCE-VUL-20771
Linux kernel: memory corruption via IP6T_SO_SET_REPLACE
An attacker can generate a memory corruption via IP6T_SO_SET_REPLACE on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2016-AVI-220, CERTFR-2016-AVI-267, CERTFR-2017-AVI-034, CERTFR-2017-AVI-282, CVE-2016-4997, DSA-3607-1, FEDORA-2016-1c409313f4, FEDORA-2016-63ee0999e4, FEDORA-2016-73a733f4d9, openSUSE-SU-2016:1798-1, openSUSE-SU-2016:2144-1, openSUSE-SU-2016:2184-1, openSUSE-SU-2016:2290-1, openSUSE-SU-2017:1140-1, RHSA-2016:1847-01, RHSA-2016:1875-01, RHSA-2016:1883-01, SUSE-SU-2016:1709-1, SUSE-SU-2016:1710-1, SUSE-SU-2016:1937-1, SUSE-SU-2016:1985-1, SUSE-SU-2016:2018-1, SUSE-SU-2016:2105-1, SUSE-SU-2016:2245-1, SUSE-SU-2016:3069-1, SUSE-SU-2017:0333-1, SUSE-SU-2017:1990-1, SUSE-SU-2017:2342-1, USN-3016-1, USN-3016-2, USN-3016-3, USN-3016-4, USN-3017-1, USN-3017-2, USN-3017-3, USN-3018-1, USN-3018-2, USN-3019-1, USN-3020-1, USN-3338-1, USN-3338-2, VIGILANCE-VUL-20735
Linux kernel: out-of-bounds memory reading via setsockopt
An attacker can force a read at an invalid address via setsockopt() on the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
CERTFR-2016-AVI-220, CERTFR-2016-AVI-267, CERTFR-2017-AVI-001, CERTFR-2017-AVI-034, CERTFR-2017-AVI-053, CERTFR-2017-AVI-282, CVE-2016-4998, DSA-3607-1, FEDORA-2016-1c409313f4, FEDORA-2016-63ee0999e4, FEDORA-2016-73a733f4d9, openSUSE-SU-2016:1798-1, openSUSE-SU-2016:2144-1, openSUSE-SU-2016:2184-1, openSUSE-SU-2016:2290-1, openSUSE-SU-2017:1140-1, RHSA-2016:1847-01, RHSA-2016:1875-01, RHSA-2016:1883-01, RHSA-2017:0036-01, SUSE-SU-2016:1709-1, SUSE-SU-2016:1710-1, SUSE-SU-2016:1937-1, SUSE-SU-2016:1985-1, SUSE-SU-2016:2018-1, SUSE-SU-2016:2105-1, SUSE-SU-2016:2245-1, SUSE-SU-2016:2976-1, SUSE-SU-2016:3069-1, SUSE-SU-2016:3304-1, SUSE-SU-2017:0333-1, SUSE-SU-2017:0471-1, SUSE-SU-2017:1990-1, SUSE-SU-2017:2342-1, USN-3016-1, USN-3016-2, USN-3016-3, USN-3016-4, USN-3017-1, USN-3017-2, USN-3017-3, USN-3018-1, USN-3018-2, USN-3019-1, USN-3020-1, VIGILANCE-VUL-19975
Linux kernel: use after free via IPv6 Option
An attacker can force the usage of a freed memory area via the handling of IPv6 options in the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2016-AVI-315, CERTFR-2017-AVI-034, CERTFR-2017-AVI-054, CERTFR-2017-AVI-131, CVE-2016-3841, RHSA-2016:2574-02, RHSA-2016:2584-02, RHSA-2016:2695-01, SUSE-SU-2016:2976-1, SUSE-SU-2016:3069-1, SUSE-SU-2017:0333-1, SUSE-SU-2017:0494-1, SUSE-SU-2017:1102-1, USN-3083-1, USN-3083-2, VIGILANCE-VUL-20648
Linux kernel: buffer overflow via arcmsr_iop_message_xfer
An attacker can generate a buffer overflow via arcmsr_iop_message_xfer() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2016-AVI-393, CERTFR-2016-AVI-426, CERTFR-2017-AVI-001, CERTFR-2017-AVI-016, CERTFR-2017-AVI-034, CERTFR-2017-AVI-053, CERTFR-2017-AVI-054, CVE-2016-7425, DLA-670-1, DSA-3696-1, openSUSE-SU-2016:2583-1, openSUSE-SU-2016:2625-1, openSUSE-SU-2016:3021-1, SUSE-SU-2016:2912-1, SUSE-SU-2016:2976-1, SUSE-SU-2016:3069-1, SUSE-SU-2016:3304-1, SUSE-SU-2017:0181-1, SUSE-SU-2017:0333-1, SUSE-SU-2017:0471-1, SUSE-SU-2017:0494-1, USN-3144-1, USN-3144-2, USN-3145-1, USN-3145-2, USN-3146-1, USN-3146-2, USN-3147-1, USN-3161-1, USN-3161-2, USN-3161-3, USN-3161-4, USN-3162-1, USN-3162-2, VIGILANCE-VUL-20642
Linux kernel: privilege escalation via setxattr
A local attacker can use setxattr() on the Linux kernel, in order to escalate his privileges...
2011746, CERTFR-2016-AVI-393, CERTFR-2016-AVI-426, CERTFR-2017-AVI-001, CERTFR-2017-AVI-034, CERTFR-2017-AVI-053, CERTFR-2017-AVI-054, CERTFR-2017-AVI-131, CERTFR-2017-AVI-287, CERTFR-2017-AVI-307, CVE-2016-7097, DLA-772-1, FEDORA-2017-6cc158c193, FEDORA-2017-81fbd592d4, K31603170, openSUSE-SU-2016:3021-1, openSUSE-SU-2016:3058-1, RHSA-2017:0817-01, RHSA-2017:1842-01, RHSA-2017:2077-01, RHSA-2017:2669-01, SUSE-SU-2016:2912-1, SUSE-SU-2016:2976-1, SUSE-SU-2016:3304-1, SUSE-SU-2017:0333-1, SUSE-SU-2017:0471-1, SUSE-SU-2017:0494-1, SUSE-SU-2017:1102-1, USN-3146-1, USN-3146-2, USN-3147-1, USN-3161-1, USN-3161-2, USN-3161-3, USN-3161-4, USN-3162-1, USN-3162-2, USN-3422-1, USN-3422-2, VIGILANCE-VUL-20479
Linux kernel: memory leak via ovl_copy_up_locked
An attacker can create a memory leak via ovl_copy_up_locked() on the Linux kernel, in order to trigger a denial of service...
CVE-2015-8953, VIGILANCE-VUL-20476
Our database contains other pages. You can request a free trial to read them.

Display information about Noyau Linux: