Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.2.2019.1491
Category:Huawei EulerOS Local Security Checks
Title:Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2019-1491)
Summary:The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2019-1491 advisory.
Description:Summary:
The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2019-1491 advisory.

Vulnerability Insight:
A use-after-free flaw was found in the way the Linux kernel's key management subsystem handled keyring object reference counting in certain error path of the join_session_keyring() function. A local, unprivileged user could use this flaw to escalate their privileges on the system.(CVE-2016-0728)

A flaw was found in the way the Linux kernel's ASN.1 DER decoder processed certain certificate files with tags of indefinite length. A local, unprivileged user could use a specially crafted X.509 certificate DER file to crash the system or, potentially, escalate their privileges on the system.(CVE-2016-0758)

The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636.(CVE-2016-0821)

The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.(CVE-2016-0823)

The aio_mount function in fs/aio.c in the Linux kernel does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions.(CVE-2016-10044)

It was found that the fix for CVE-2016-9576 was incomplete: the Linux kernel's sg implementation did not properly restrict write operations in situations where the KERNEL_DS option is set. A local attacker to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging write access to a /dev/sg device.(CVE-2016-10088)

A use-after-free flaw was found in the Linux kernel which enables a race condition in the L2TPv3 IP Encapsulation feature. A local user could use this flaw to escalate their privileges or crash the system.(CVE-2016-10200)

Mounting a crafted EXT4 image read-only leads to an attacker controlled memory corruption and SLAB-Out-of-Bounds reads.(CVE-2016-10208)

The Linux kernel allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag. This may create a kernel panic or memory corruption leading to privilege escalation.(CVE-2016-10229)

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.(CVE-2016-1575)

The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel' package(s) on Huawei EulerOS Virtualization 3.0.1.0.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-0728
1034701
http://www.securitytracker.com/id/1034701
39277
https://www.exploit-db.com/exploits/39277/
81054
http://www.securityfocus.com/bid/81054
DSA-3448
http://www.debian.org/security/2016/dsa-3448
FEDORA-2016-5d43766e33
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
FEDORA-2016-b59fd603be
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
HPSBHF03436
https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05018265
RHSA-2016:0064
http://rhn.redhat.com/errata/RHSA-2016-0064.html
RHSA-2016:0065
http://rhn.redhat.com/errata/RHSA-2016-0065.html
RHSA-2016:0068
http://rhn.redhat.com/errata/RHSA-2016-0068.html
SUSE-SU-2016:0205
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00026.html
SUSE-SU-2016:0341
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00012.html
SUSE-SU-2016:0745
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html
SUSE-SU-2016:0746
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html
SUSE-SU-2016:0747
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html
SUSE-SU-2016:0750
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html
SUSE-SU-2016:0751
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html
SUSE-SU-2016:0752
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html
SUSE-SU-2016:0753
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html
SUSE-SU-2016:0755
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html
SUSE-SU-2016:0756
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html
SUSE-SU-2016:0757
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html
USN-2870-1
http://www.ubuntu.com/usn/USN-2870-1
USN-2870-2
http://www.ubuntu.com/usn/USN-2870-2
USN-2871-1
http://www.ubuntu.com/usn/USN-2871-1
USN-2871-2
http://www.ubuntu.com/usn/USN-2871-2
USN-2872-1
http://www.ubuntu.com/usn/USN-2872-1
USN-2872-2
http://www.ubuntu.com/usn/USN-2872-2
USN-2872-3
http://www.ubuntu.com/usn/USN-2872-3
USN-2873-1
http://www.ubuntu.com/usn/USN-2873-1
[oss-security] 20160119 Linux kernel: use after free in keyring facility.
http://www.openwall.com/lists/oss-security/2016/01/19/2
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
http://source.android.com/security/bulletin/2016-03-01.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
https://bto.bluecoat.com/security-advisory/sa112
https://bugzilla.redhat.com/show_bug.cgi?id=1297475
https://github.com/torvalds/linux/commit/23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://security.netapp.com/advisory/ntap-20160211-0001/
Common Vulnerability Exposure (CVE) ID: CVE-2016-0758
90626
http://www.securityfocus.com/bid/90626
HPSBHF3548
https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158555
RHSA-2016:1033
http://rhn.redhat.com/errata/RHSA-2016-1033.html
RHSA-2016:1051
http://rhn.redhat.com/errata/RHSA-2016-1051.html
RHSA-2016:1055
http://rhn.redhat.com/errata/RHSA-2016-1055.html
SUSE-SU-2016:1672
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
SUSE-SU-2016:1690
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
SUSE-SU-2016:1937
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
SUSE-SU-2016:1961
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
SUSE-SU-2016:1985
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
SUSE-SU-2016:1994
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
SUSE-SU-2016:1995
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
SUSE-SU-2016:2000
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html
SUSE-SU-2016:2001
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
SUSE-SU-2016:2002
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
SUSE-SU-2016:2003
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html
SUSE-SU-2016:2005
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
SUSE-SU-2016:2006
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
SUSE-SU-2016:2007
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
SUSE-SU-2016:2009
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
SUSE-SU-2016:2010
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
SUSE-SU-2016:2011
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html
SUSE-SU-2016:2014
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
SUSE-SU-2016:2105
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
USN-2979-4
http://www.ubuntu.com/usn/USN-2979-4
[oss-security] 20160513 CVE-2016-0758 - Linux kernel - Flaw in ASN.1 DER decoder for x509 certificate DER files.
http://www.openwall.com/lists/oss-security/2016/05/12/9
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa
http://source.android.com/security/bulletin/2016-10-01.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
https://bugzilla.redhat.com/show_bug.cgi?id=1300257
https://github.com/torvalds/linux/commit/23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa
openSUSE-SU-2016:1641
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
openSUSE-SU-2016:2184
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-0821
BugTraq ID: 84260
http://www.securityfocus.com/bid/84260
Debian Security Information: DSA-3607 (Google Search)
http://www.debian.org/security/2016/dsa-3607
http://www.openwall.com/lists/oss-security/2015/05/02/6
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
Common Vulnerability Exposure (CVE) ID: CVE-2016-0823
BugTraq ID: 84265
http://www.securityfocus.com/bid/84265
http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-10044
BugTraq ID: 96122
http://www.securityfocus.com/bid/96122
http://www.securitytracker.com/id/1037798
Common Vulnerability Exposure (CVE) ID: CVE-2016-10088
BugTraq ID: 95169
http://www.securityfocus.com/bid/95169
http://www.openwall.com/lists/oss-security/2016/12/30/1
RedHat Security Advisories: RHSA-2017:0817
http://rhn.redhat.com/errata/RHSA-2017-0817.html
RedHat Security Advisories: RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:1842
RedHat Security Advisories: RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2077
RedHat Security Advisories: RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2669
http://www.securitytracker.com/id/1037538
Common Vulnerability Exposure (CVE) ID: CVE-2016-10200
BugTraq ID: 101783
http://www.securityfocus.com/bid/101783
RedHat Security Advisories: RHSA-2017:2437
https://access.redhat.com/errata/RHSA-2017:2437
RedHat Security Advisories: RHSA-2017:2444
https://access.redhat.com/errata/RHSA-2017:2444
http://www.securitytracker.com/id/1037965
http://www.securitytracker.com/id/1037968
Common Vulnerability Exposure (CVE) ID: CVE-2016-10208
BugTraq ID: 94354
http://www.securityfocus.com/bid/94354
http://seclists.org/fulldisclosure/2016/Nov/75
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
http://www.openwall.com/lists/oss-security/2017/02/05/3
RedHat Security Advisories: RHSA-2017:1297
https://access.redhat.com/errata/RHSA-2017:1297
RedHat Security Advisories: RHSA-2017:1298
https://access.redhat.com/errata/RHSA-2017:1298
RedHat Security Advisories: RHSA-2017:1308
https://access.redhat.com/errata/RHSA-2017:1308
https://usn.ubuntu.com/3754-1/
Common Vulnerability Exposure (CVE) ID: CVE-2016-10229
BugTraq ID: 97397
http://www.securityfocus.com/bid/97397
http://www.securitytracker.com/id/1038201
Common Vulnerability Exposure (CVE) ID: CVE-2016-1575
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360
http://www.halfdog.net/Security/2016/UserNamespaceOverlayfsXattrSetgidPrivilegeEscalation/
http://www.openwall.com/lists/oss-security/2016/02/24/7
http://www.openwall.com/lists/oss-security/2021/10/18/1
Common Vulnerability Exposure (CVE) ID: CVE-2016-1576
http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/
https://launchpadlibrarian.net/235300093/0005-overlayfs-Be-more-careful-about-copying-up-sxid-file.patch
https://launchpadlibrarian.net/235300225/0006-overlayfs-Propogate-nosuid-from-lower-and-upper-moun.patch
http://www.openwall.com/lists/oss-security/2016/02/24/8
Common Vulnerability Exposure (CVE) ID: CVE-2016-2053
http://www.openwall.com/lists/oss-security/2016/01/25/4
RedHat Security Advisories: RHSA-2016:2574
http://rhn.redhat.com/errata/RHSA-2016-2574.html
RedHat Security Advisories: RHSA-2016:2584
http://rhn.redhat.com/errata/RHSA-2016-2584.html
http://www.securitytracker.com/id/1036763
SuSE Security Announcement: SUSE-SU-2016:1672 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:1690 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:1937 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:1961 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:1985 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:1994 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:1995 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2000 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2001 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2002 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2003 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2005 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2006 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2007 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2009 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2010 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2011 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2014 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2105 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1641 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:2184 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2016-2069
BugTraq ID: 81809
http://www.securityfocus.com/bid/81809
Debian Security Information: DSA-3503 (Google Search)
http://www.debian.org/security/2016/dsa-3503
http://www.openwall.com/lists/oss-security/2016/01/25/1
SuSE Security Announcement: SUSE-SU-2016:0911 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
SuSE Security Announcement: SUSE-SU-2016:1102 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
SuSE Security Announcement: SUSE-SU-2016:2074 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
SuSE Security Announcement: openSUSE-SU-2016:1008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2989-1
http://www.ubuntu.com/usn/USN-2998-1
Common Vulnerability Exposure (CVE) ID: CVE-2016-2070
http://www.openwall.com/lists/oss-security/2016/01/25/5
Common Vulnerability Exposure (CVE) ID: CVE-2016-2117
84500
http://www.securityfocus.com/bid/84500
DSA-3607
RHSA-2016:2574
RHSA-2016:2584
USN-2989-1
USN-2998-1
USN-3000-1
http://www.ubuntu.com/usn/USN-3000-1
USN-3001-1
http://www.ubuntu.com/usn/USN-3001-1
USN-3002-1
http://www.ubuntu.com/usn/USN-3002-1
USN-3003-1
http://www.ubuntu.com/usn/USN-3003-1
USN-3004-1
http://www.ubuntu.com/usn/USN-3004-1
USN-3005-1
http://www.ubuntu.com/usn/USN-3005-1
USN-3006-1
http://www.ubuntu.com/usn/USN-3006-1
USN-3007-1
http://www.ubuntu.com/usn/USN-3007-1
[oss-security] 20160316 CVE-2016-2117 memory disclosure to ethernet due to unchecked scatter/gather IO
http://www.openwall.com/lists/oss-security/2016/03/16/7
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43bfaeddc79effbf3d0fcb53ca477cca66f3db8
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
https://bugzilla.redhat.com/show_bug.cgi?id=1312298
https://github.com/torvalds/linux/commit/f43bfaeddc79effbf3d0fcb53ca477cca66f3db8
Common Vulnerability Exposure (CVE) ID: CVE-2016-2184
20160310 oss-2016-16: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (snd-usb-audio driver)
http://seclists.org/bugtraq/2016/Mar/88
20160310 oss-2016-17: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes (multiple free) on invalid USB device descriptors (snd-usb-audio driver)
http://seclists.org/bugtraq/2016/Mar/89
20160314 Re: oss-2016-17: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes (multiple free) on invalid USB device descriptors (snd-usb-audio driver)
http://seclists.org/bugtraq/2016/Mar/102
39555
https://www.exploit-db.com/exploits/39555/
84340
http://www.securityfocus.com/bid/84340
SUSE-SU-2016:1019
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
SUSE-SU-2016:1707
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
SUSE-SU-2016:1764
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
SUSE-SU-2016:2074
USN-2968-1
USN-2968-2
USN-2969-1
USN-2970-1
USN-2971-1
USN-2971-2
USN-2971-3
USN-2996-1
http://www.ubuntu.com/usn/USN-2996-1
USN-2997-1
http://www.ubuntu.com/usn/USN-2997-1
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f886ca12765d20124bd06291c82951fd49a33be
https://bugzilla.redhat.com/show_bug.cgi?id=1317012
https://github.com/torvalds/linux/commit/0f886ca12765d20124bd06291c82951fd49a33be
https://source.android.com/security/bulletin/2016-11-01.html
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
openSUSE-SU-2016:1008
Common Vulnerability Exposure (CVE) ID: CVE-2016-2185
20160310 oss-2016-18: Multiple Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (ati_remote2 driver)
http://seclists.org/bugtraq/2016/Mar/90
20160315 Re: oss-2016-18: Multiple Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (ati_remote2 driver)
http://seclists.org/bugtraq/2016/Mar/116
84341
http://www.securityfocus.com/bid/84341
SUSE-SU-2016:1696
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
https://bugzilla.redhat.com/show_bug.cgi?id=1283362
https://bugzilla.redhat.com/show_bug.cgi?id=1283363
https://bugzilla.redhat.com/show_bug.cgi?id=1317014
https://github.com/torvalds/linux/commit/950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d
openSUSE-SU-2016:1382
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-2186
20160310 oss-2016-13: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (powermate driver)
http://seclists.org/bugtraq/2016/Mar/85
20160315 Re: oss-2016-13: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (powermate driver)
http://seclists.org/bugtraq/2016/Mar/117
84337
http://www.securityfocus.com/bid/84337
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9c6ba456711687b794dcf285856fc14e2c76074f
https://bugzilla.redhat.com/show_bug.cgi?id=1317015
https://github.com/torvalds/linux/commit/9c6ba456711687b794dcf285856fc14e2c76074f
Common Vulnerability Exposure (CVE) ID: CVE-2016-2187
85425
http://www.securityfocus.com/bid/85425
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=162f98dea487206d9ab79fc12ed64700667a894d
https://bugzilla.redhat.com/show_bug.cgi?id=1317017
https://github.com/torvalds/linux/commit/162f98dea487206d9ab79fc12ed64700667a894d
Common Vulnerability Exposure (CVE) ID: CVE-2016-2188
20160310 oss-2016-15: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (iowarrior driver)
http://seclists.org/bugtraq/2016/Mar/87
20160315 Re: oss-2016-15: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (iowarrior driver)
http://seclists.org/bugtraq/2016/Mar/118
39556
https://www.exploit-db.com/exploits/39556/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ec0ef3a82125efc36173062a50624550a900ae0
https://bugzilla.redhat.com/show_bug.cgi?id=1317018
https://github.com/torvalds/linux/commit/4ec0ef3a82125efc36173062a50624550a900ae0
Common Vulnerability Exposure (CVE) ID: CVE-2016-2384
BugTraq ID: 83256
http://www.securityfocus.com/bid/83256
https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384
http://www.openwall.com/lists/oss-security/2016/02/14/2
http://www.securitytracker.com/id/1035072
SuSE Security Announcement: SUSE-SU-2016:1019 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:1031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html
SuSE Security Announcement: SUSE-SU-2016:1032 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html
SuSE Security Announcement: SUSE-SU-2016:1033 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html
SuSE Security Announcement: SUSE-SU-2016:1034 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html
SuSE Security Announcement: SUSE-SU-2016:1035 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html
SuSE Security Announcement: SUSE-SU-2016:1037 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html
SuSE Security Announcement: SUSE-SU-2016:1038 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html
SuSE Security Announcement: SUSE-SU-2016:1039 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html
SuSE Security Announcement: SUSE-SU-2016:1040 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html
SuSE Security Announcement: SUSE-SU-2016:1041 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html
SuSE Security Announcement: SUSE-SU-2016:1045 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html
SuSE Security Announcement: SUSE-SU-2016:1046 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html
SuSE Security Announcement: SUSE-SU-2016:1764 (Google Search)
http://www.ubuntu.com/usn/USN-2928-1
http://www.ubuntu.com/usn/USN-2928-2
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
Common Vulnerability Exposure (CVE) ID: CVE-2016-2543
BugTraq ID: 83377
http://www.securityfocus.com/bid/83377
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.securitytracker.com/id/1035304
Common Vulnerability Exposure (CVE) ID: CVE-2016-2544
BugTraq ID: 83380
http://www.securityfocus.com/bid/83380
http://www.securitytracker.com/id/1035305
CopyrightCopyright (C) 2020 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.