Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): Linux kernel
- Search Type: Search All
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2015-8996 |
In TrustZone a time-of-check time-of-use race condition could potentially exist in a QFPROM routine in all Android releases from CAF using the Linux kernel. Published: May 16, 2017; 10:29:00 AM -0400 |
V3.0: 7.0 HIGH V2.0: 7.6 HIGH |
CVE-2015-8995 |
In TrustZone an integer overflow vulnerability can potentially occur in all Android releases from CAF using the Linux kernel. Published: May 16, 2017; 10:29:00 AM -0400 |
V3.0: 7.8 HIGH V2.0: 9.3 HIGH |
CVE-2014-9937 |
In TrustZone a buffer overflow vulnerability can potentially occur in a DRM routine in all Android releases from CAF using the Linux kernel. Published: May 16, 2017; 10:29:00 AM -0400 |
V3.0: 7.8 HIGH V2.0: 9.3 HIGH |
CVE-2014-9936 |
In TrustZone a time-of-check time-of-use race condition could potentially exist in an authentication routine in all Android releases from CAF using the Linux kernel. Published: May 16, 2017; 10:29:00 AM -0400 |
V3.0: 7.0 HIGH V2.0: 7.6 HIGH |
CVE-2014-9935 |
In TrustZone an integer overflow vulnerability leading to a buffer overflow could potentially occur in a DRM routine in all Android releases from CAF using the Linux kernel. Published: May 16, 2017; 10:29:00 AM -0400 |
V3.0: 7.8 HIGH V2.0: 9.3 HIGH |
CVE-2014-9934 |
A PKCS#1 v1.5 signature verification routine in all Android releases from CAF using the Linux kernel may not check padding. Published: May 16, 2017; 10:29:00 AM -0400 |
V3.0: 7.8 HIGH V2.0: 9.3 HIGH |
CVE-2014-9933 |
Due to missing input validation in all Android releases from CAF using the Linux kernel, HLOS can write to fuses for which it should not have access. Published: May 16, 2017; 10:29:00 AM -0400 |
V3.0: 7.8 HIGH V2.0: 9.3 HIGH |
CVE-2014-9932 |
In TrustZone, an integer overflow vulnerability can potentially occur in all Android releases from CAF using the Linux kernel due to an improper address range computation. Published: May 16, 2017; 10:29:00 AM -0400 |
V3.0: 7.8 HIGH V2.0: 9.3 HIGH |
CVE-2014-9931 |
A buffer overflow vulnerability in all Android releases from CAF using the Linux kernel can potentially occur if an OEM performs an app region size customization due to a hard-coded value. Published: May 16, 2017; 10:29:00 AM -0400 |
V3.0: 7.8 HIGH V2.0: 9.3 HIGH |
CVE-2017-7495 |
fs/ext4/inode.c in the Linux kernel before 4.6.2, when ext4 data=ordered mode is used, mishandles a needs-flushing-before-commit list, which allows local users to obtain sensitive information from other users' files in opportunistic circumstances by waiting for a hardware reset, creating a new file, making write system calls, and reading this file. Published: May 15, 2017; 2:29:00 PM -0400 |
V3.0: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2017-7487 |
The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface. Published: May 14, 2017; 6:29:00 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2017-8925 |
The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling. Published: May 12, 2017; 5:29:00 PM -0400 |
V3.0: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2017-8924 |
The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow. Published: May 12, 2017; 5:29:00 PM -0400 |
V3.0: 4.6 MEDIUM V2.0: 2.1 LOW |
CVE-2017-8246 |
In function msm_pcm_playback_close() in all Android releases from CAF using the Linux kernel, prtd is assigned substream->runtime->private_data. Later, prtd is freed. However, prtd is not sanitized and set to NULL, resulting in a dangling pointer. There are other functions that access the same memory (substream->runtime->private_data) with a NULL check, such as msm_pcm_volume_ctl_put(), which means this freed memory could be used. Published: May 12, 2017; 4:29:00 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2017-8245 |
In all Android releases from CAF using the Linux kernel, while processing a voice SVC request which is nonstandard by specifying a payload size that will overflow its own declared size, an out of bounds memory copy occurs. Published: May 12, 2017; 4:29:00 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2017-8244 |
In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write). Published: May 12, 2017; 4:29:00 PM -0400 |
V3.1: 7.0 HIGH V2.0: 6.9 MEDIUM |
CVE-2017-7472 |
The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls. Published: May 11, 2017; 3:29:00 PM -0400 |
V3.0: 5.5 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2017-8890 |
The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call. Published: May 10, 2017; 12:29:00 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2017-8831 |
The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability. Published: May 08, 2017; 2:29:00 AM -0400 |
V3.1: 6.4 MEDIUM V2.0: 6.9 MEDIUM |
CVE-2015-9004 |
kernel/events/core.c in the Linux kernel before 3.19 mishandles counter grouping, which allows local users to gain privileges via a crafted application, related to the perf_pmu_register and perf_event_open functions. Published: May 02, 2017; 5:59:00 PM -0400 |
V3.1: 7.8 HIGH V2.0: 9.3 HIGH |