This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Linux First view 1995-09-07
Product Linux Kernel Last view 2020-07-30
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:* 1863
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:* 1840
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:* 1832
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:* 1828
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:* 1827
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:* 1827
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:* 1824
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:* 1823
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:* 1822
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:* 1818
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:* 1815
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:* 1805
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:* 1805
cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:* 1805
cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:* 1805
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:* 1803
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:* 1802
cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:* 1801
cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:* 1796
cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:* 1790
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:* 1789
cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:* 1789
cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:* 1788
cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:* 1786
cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:* 1786
cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:* 1786
cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:* 1786
cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:* 1786
cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:* 1786
cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:* 1785
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:* 1784
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:* 1784

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.5 2020-07-30 CVE-2020-16166

The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.

7.8 2020-07-20 CVE-2020-15852

An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka CID-cadfad870154.

6.7 2020-07-15 CVE-2020-15780

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.

6.7 2020-07-15 CVE-2019-20908

An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.

5.5 2020-07-13 CVE-2019-19338

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

5.5 2020-06-29 CVE-2020-15393

In the Linux kernel through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.

4.2 2020-06-18 CVE-2020-14416

In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.

4.4 2020-06-12 CVE-2020-10732

A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.

7.8 2020-06-09 CVE-2020-13974

** DISPUTED ** An issue was discovered in the Linux kernel through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.

7.8 2020-06-09 CVE-2020-10757

A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.

5.5 2020-06-03 CVE-2019-20812

An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.

5.5 2020-06-03 CVE-2019-20811

An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.

5.5 2020-06-03 CVE-2019-20810

go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.

4.4 2020-05-27 CVE-2019-20806

An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.

5.9 2020-05-22 CVE-2020-10711

A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.

6.5 2020-05-18 CVE-2020-13143

gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.

5.3 2020-05-15 CVE-2020-12888

The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.

5.3 2020-05-12 CVE-2020-12826

A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.

5.5 2020-05-09 CVE-2020-12771

An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.

6.7 2020-05-09 CVE-2020-12770

An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.

5.5 2020-05-09 CVE-2020-12769

An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.

5.5 2020-05-09 CVE-2020-12768

** DISPUTED ** An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it's a one-time leak at the boot, the size is negligible, and it can't be triggered at will.

5.5 2020-05-09 CVE-2019-20794

An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.

6.4 2020-05-08 CVE-2020-10690

There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.

7 2020-05-08 CVE-2019-14898

The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
12% (261) CWE-200 Information Exposure
11% (229) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
10% (201) CWE-264 Permissions, Privileges, and Access Controls
9% (185) CWE-399 Resource Management Errors
9% (182) CWE-20 Improper Input Validation
6% (132) CWE-476 NULL Pointer Dereference
6% (122) CWE-362 Race Condition
5% (119) CWE-416 Use After Free
4% (89) CWE-189 Numeric Errors
4% (86) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (57) CWE-787 Out-of-bounds Write
2% (54) CWE-125 Out-of-bounds Read
2% (43) CWE-190 Integer Overflow or Wraparound
1% (36) CWE-284 Access Control (Authorization) Issues
1% (25) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
0% (18) CWE-772 Missing Release of Resource after Effective Lifetime
0% (17) CWE-269 Improper Privilege Management
0% (14) CWE-415 Double Free
0% (14) CWE-310 Cryptographic Issues
0% (13) CWE-17 Code
0% (10) CWE-16 Configuration
0% (8) CWE-369 Divide By Zero
0% (8) CWE-19 Data Handling
0% (7) CWE-388 Error Handling
0% (7) CWE-276 Incorrect Default Permissions

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-17 Accessing, Modifying or Executing Executable Files
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-28 Fuzzing
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-39 Manipulating Opaque Client-based Data Tokens
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-44 Overflow Binary Resource File
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-51 Poison Web Service Registry
CAPEC-52 Embedding NULL Bytes
CAPEC-53 Postfix, Null Terminate, and Backslash

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:2665 Data Leak in NIC
oval:org.mitre.oval:def:28706 Critical Patch Update January 2015
oval:org.mitre.oval:def:254 Linux Kernel ptrace Privilege Escalation Vulnerability
oval:org.mitre.oval:def:260 Netfilter Denial of Service
oval:org.mitre.oval:def:261 Linux Route Cache / Netfilter Denial of Service
oval:org.mitre.oval:def:278 Linux ioperm Privilege Restriction Vulnerability
oval:org.mitre.oval:def:309 Linux Kernel execve Race Condition Vulnerability
oval:org.mitre.oval:def:10285 The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer...
oval:org.mitre.oval:def:327 Linux Kernel execve Read Access to Restricted File Descriptors
oval:org.mitre.oval:def:328 Linux Kernel /proc/self setuid Vulnerability
oval:org.mitre.oval:def:386 Lunix Kernel NFSv3 Procedure Kernel Panic Vulnerability
oval:org.mitre.oval:def:9406 Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not prop...
oval:org.mitre.oval:def:859 Red Hat Kernel Real Time Clock Data Leakage
oval:org.mitre.oval:def:1013 Red Hat Enterprise 3 Kernel Real Time Clock Data Leakage
oval:org.mitre.oval:def:867 Red Hat Enterprise 3 Linux Kernel do_mremap Denial of Service Vulnerability
oval:org.mitre.oval:def:860 Red Hat Linux Kernel do_mremap Denial of Service Vulnerability
oval:org.mitre.oval:def:10189 The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and p...
oval:org.mitre.oval:def:9707 Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6....
oval:org.mitre.oval:def:9423 kmod in the Linux kernel does not set its uid, suid, gid, or sgid to 0, which...
oval:org.mitre.oval:def:868 Linux Kernel eflags Checking Privilege Escalation Vulnerability
oval:org.mitre.oval:def:10910 Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation f...
oval:org.mitre.oval:def:9204 Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gai...
oval:org.mitre.oval:def:834 Red Hat Kernel R128 DRI Limits Checking Vulnerability
oval:org.mitre.oval:def:1017 Red Hat Enterprise 3 Kernel R128 DRI Limits Checking Vulnerability
oval:org.mitre.oval:def:835 Red Hat Kernel ncp_lookup Function BO

SAINT Exploits

Description Link
Linux kernel ptrace privilege elevation vulnerability More info here
Linux kernel __sock_diag_rcv_msg Netlink message privilege elevation More info here
Ubuntu overlayfs privilege elevation More info here
Linux kernel futex_requeue privilege elevation More info here
Linux Dirty COW Local File Overwrite More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
78509 Linux Kernel /proc/<pid>/mem Access Restriction Weakness Local Privileg...
78303 Linux Kernel sctp_rcv() / sctp_accept() Socket Lock Race Remote DoS
78302 Linux Kernel m_stop() Implementation Local DoS
78301 Linux Kernel NSF O_Direct Implementation Local DoS
78264 Linux Kernel KVM syscall Instruction Executable Handling Local DoS
78226 Linux Kernel fs/xfs/xfs_acl.c xfs_acl_from_disk() Function Memory Corruption
78225 Linux Kernel net/ipv4/igmp.c igmp_heard_query() Function IGMP Query Parsing R...
78014 Linux Kernel SG_IO SCSI IOCTL Command Parsing Local Privilege Escalation
77780 Linux Kernel B.A.T.M.A.N. net/batman/icmp_socket.c bat_socket_read() Packet P...
77684 Linux Kernel OMAP4 Bridge Networking Interface Network Packet Parsing Remote DoS
77683 Linux Kernel HFS File System Mount Local Privilege Escalation
77658 Linux Kernel hfs_find_init() Function NULL Pointer Dereference Local DoS
77626 Linux Kernel kvm_vm_ioctl_assign_device Function /dev/kym Local DoS
77625 Linux Kernel NFSv4 Mount mknod(2) Syscall Local DoS
77485 Linux Kernel /mm/oom_kill.c Local Overflow
77452 OpenFabrics Enterprise Distribution (OFED) RDS_FLAG_CONG_BITMAP Flagged RDS M...
77450 Linux Kernel security/keys/user_defined.c user_update() Function NULL Pointer...
77360 Linux Kernel TX_SKB_SHARING Local DoS
77355 Linux Kernel clock_gettime() Call Parsing Local DoS
77295 Linux Kernel UFO IPv6 UDP Datagram Parsing Remote DoS
77294 Linux Kernel VLAN 0 Frame Priority Tag Parsing Remote DoS
77293 Linux Kernel b43 Driver Wireless Interface Frame Parsing Remote DoS
77292 Linux Kernel tpm_read() Local TPM Command Result Disclosure
77100 Linux Kernel ACL Attribute Request NFSv4 Response Parsing Local DoS
77092 Linux Kernel fs/jbd/journal.c journal_get_superblock() ext3 Image Handling Lo...

ExploitDB Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
35370 Linux Kernel libfutex Local Root for RHEL/CentOS 7.0.1406
35161 Linux Local Root => 2.6.39 (32-bit & 64-bit) - Mempodipper #2
34923 Linux Kernel remount FUSE Exploit
34134 Linux Kernel ptrace/sysret - Local Privilege Escalation
33824 Linux Kernel <= 3.13 - Local Privilege Escalation PoC (gid)
33516 Linux kernel 3.14-rc1 <= 3.15-rc4 - Raw Mode PTY Local Echo Race Condition...
33336 Linux Kernel 3.3-3.8 - SOCK_DIAG Local Root Exploit
32926 Linux group_info refcounter - Overflow Memory Corruption
31574 Linux ARM - Local Root Exploit
31347 linux 3.4+ local root (CONFIG_X86_X32=y)
31346 Linux 3.4+ Arbitrary write with CONFIG_X86_X32
30605 Linux Kernel 2.6.x ALSA snd-page-alloc Local Proc File Information Disclosure...
29822 Man Command -H Flag Local Buffer Overflow Vulnerability
26489 Linux Kernel 2.6.x Sysctl Unregistration Local Denial of Service Vulnerability
26382 Linux Kernel 2.6.x IPV6 Local Denial of Service Vulnerability
26131 Linux kernel perf_swevent_init - Local root Exploit
26076 Cisco ASA < 8.4.4.6|8.2.5.32 Ethernet Information Leak
25375 KDE KMail 1.7.1 HTML EMail Remote Email Content Spoofing Vulnerability
24696 Linux Kernel 2.6.x IPTables Logging Rules Integer Underflow Vulnerability
24459 Linux Kernel /dev/ptmx Key Stroke Timing Local Disclosure
22131 Linux Kernel 2.0.x/2.2.x/2.4.x,FreeBSD 4.x Network Device Driver Frame Paddin...
18411 Mempodipper - Linux Local Root for >=2.6.39, 32-bit and 64-bit
18378 Linux IGMP Remote Denial Of Service (Introduced in linux-2.6.36)
17787 Linux Kernel < 2.6.36.2 Econet Privilege Escalation Exploit
16973 Linux <= 2.6.37-rc1 serial_core TIOCGICOUNT Leak Exploit

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2013-09-18 Name : Debian Security Advisory DSA 2389-1 (linux-2.6 - privilege escalation/denial ...
File : nvt/deb_2389_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2443-1 (linux-2.6 - privilege escalation/denial ...
File : nvt/deb_2443_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2469-1 (linux-2.6 - privilege escalation/denial ...
File : nvt/deb_2469_1.nasl
2012-12-26 Name : CentOS Update for kernel CESA-2012:1580 centos6
File : nvt/gb_CESA-2012_1580_kernel_centos6.nasl
2012-12-26 Name : RedHat Update for kernel RHSA-2012:1580-01
File : nvt/gb_RHSA-2012_1580-01_kernel.nasl
2012-12-26 Name : Ubuntu Update for linux USN-1669-1
File : nvt/gb_ubuntu_USN_1669_1.nasl
2012-12-26 Name : Ubuntu Update for linux-ti-omap4 USN-1670-1
File : nvt/gb_ubuntu_USN_1670_1.nasl
2012-12-26 Name : Ubuntu Update for linux USN-1671-1
File : nvt/gb_ubuntu_USN_1671_1.nasl
2012-12-26 Name : Ubuntu Update for linux-ti-omap4 USN-1673-1
File : nvt/gb_ubuntu_USN_1673_1.nasl
2012-12-26 Name : Ubuntu Update for linux USN-1677-1
File : nvt/gb_ubuntu_USN_1677_1.nasl
2012-12-26 Name : Ubuntu Update for linux-lts-backport-oneiric USN-1678-1
File : nvt/gb_ubuntu_USN_1678_1.nasl
2012-12-26 Name : Ubuntu Update for linux-ti-omap4 USN-1679-1
File : nvt/gb_ubuntu_USN_1679_1.nasl
2012-12-18 Name : Fedora Update for kernel FEDORA-2012-20240
File : nvt/gb_fedora_2012_20240_kernel_fc16.nasl
2012-12-14 Name : Ubuntu Update for linux-ec2 USN-1664-1
File : nvt/gb_ubuntu_USN_1664_1.nasl
2012-12-11 Name : Ubuntu Update for linux USN-1660-1
File : nvt/gb_ubuntu_USN_1660_1.nasl
2012-12-11 Name : Ubuntu Update for linux USN-1661-1
File : nvt/gb_ubuntu_USN_1661_1.nasl
2012-12-06 Name : CentOS Update for kernel CESA-2012:1540 centos5
File : nvt/gb_CESA-2012_1540_kernel_centos5.nasl
2012-12-06 Name : RedHat Update for kernel RHSA-2012:1540-01
File : nvt/gb_RHSA-2012_1540-01_kernel.nasl
2012-12-06 Name : Ubuntu Update for linux-ec2 USN-1653-1
File : nvt/gb_ubuntu_USN_1653_1.nasl
2012-12-04 Name : Fedora Update for kernel FEDORA-2012-19337
File : nvt/gb_fedora_2012_19337_kernel_fc17.nasl
2012-12-04 Name : Ubuntu Update for linux USN-1644-1
File : nvt/gb_ubuntu_USN_1644_1.nasl
2012-12-04 Name : Ubuntu Update for linux-ti-omap4 USN-1645-1
File : nvt/gb_ubuntu_USN_1645_1.nasl
2012-12-04 Name : Ubuntu Update for linux USN-1646-1
File : nvt/gb_ubuntu_USN_1646_1.nasl
2012-12-04 Name : Ubuntu Update for linux-ti-omap4 USN-1647-1
File : nvt/gb_ubuntu_USN_1647_1.nasl
2012-12-04 Name : Ubuntu Update for linux USN-1648-1
File : nvt/gb_ubuntu_USN_1648_1.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0150 Multiple Security Vulnerabilities in Juniper Networks CTPView
Severity: Category I - VMSKEY: V0061073
2014-B-0145 HP Operations Manager Remote Code Execution Vulnerabilities
Severity: Category I - VMSKEY: V0056563
2012-A-0153 Multiple Vulnerabilities in VMware ESX 4.0 and ESXi 4.0
Severity: Category I - VMSKEY: V0033884
2012-A-0148 Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1
Severity: Category I - VMSKEY: V0033794
2012-A-0136 Multiple Vulnerabilities in Juniper Network Management Products
Severity: Category I - VMSKEY: V0033662
2012-A-0073 Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1
Severity: Category I - VMSKEY: V0032171
2012-A-0056 Multiple Vulnerabilities in VMWare ESX 4.0 and ESXi 4.0
Severity: Category I - VMSKEY: V0031979
2012-A-0020 Multiple Vulnerabilities in VMware ESX 4.1 and ESXi 4.1
Severity: Category I - VMSKEY: V0031252
2011-A-0147 Multiple Vulnerabilities in VMware ESX and ESXi
Severity: Category I - VMSKEY: V0030545
2011-A-0075 Multiple Vulnerabilities in VMware Products
Severity: Category I - VMSKEY: V0028311
2011-A-0066 Multiple Vulnerabilities in VMware Products
Severity: Category I - VMSKEY: V0027158
2010-B-0085 Linux Kernel Privilege Escalation Vulnerability
Severity: Category I - VMSKEY: V0025410
2010-A-0037 Multiple Vulnerabilities in Linux Kernel
Severity: Category I - VMSKEY: V0022704
2010-A-0015 Multiple Vulnerabilities in Red Hat Linux Kernel
Severity: Category I - VMSKEY: V0022631
2010-A-0001 Multiple Vulnerabilities in Linux Kernel
Severity: Category I - VMSKEY: V0022180
2009-A-0105 Multiple Vulnerabilities in VMware Products
Severity: Category I - VMSKEY: V0021867
2009-T-0024 Multiple Vulnerabilities in Linux Kernel
Severity: Category I - VMSKEY: V0018983

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 record route rr denial of service attempt
RuleID : 8730 - Type : PROTOCOL-ICMP - Revision : 6
2014-01-10 IPv6 packets encapsulated in IPv4
RuleID : 8446 - Type : POLICY-OTHER - Revision : 8
2014-01-10 kernel SCTP chunkless packet denial of service attempt
RuleID : 7021 - Type : OS-LINUX - Revision : 9
2014-01-10 root directory
RuleID : 520-community - Type : PROTOCOL-TFTP - Revision : 13
2014-01-10 root directory
RuleID : 520 - Type : PROTOCOL-TFTP - Revision : 13
2014-01-10 parent directory
RuleID : 519-community - Type : PROTOCOL-TFTP - Revision : 15
2014-01-10 parent directory
RuleID : 519 - Type : PROTOCOL-TFTP - Revision : 15
2014-01-10 Put
RuleID : 518-community - Type : PROTOCOL-TFTP - Revision : 16
2014-01-10 Put
RuleID : 518 - Type : PROTOCOL-TFTP - Revision : 16
2019-09-26 Google Android Kernel local denial of service attempt
RuleID : 51291 - Type : OS-MOBILE - Revision : 1
2019-09-26 Google Android Kernel local denial of service attempt
RuleID : 51290 - Type : OS-MOBILE - Revision : 1
2019-01-15 DECODE_TCP_INVALID_OFFSET
RuleID : 46 - Type : DECODE_TCP_INVALID_OFFSET - Revision : 1
2014-01-10 DECODE_ICMP_DOS_ATTEMPT
RuleID : 452 - Type : DECODE_ICMP_DOS_ATTEMPT - Revision : 1
2017-11-21 Linux kernel nfsd nfsd4_layout_verify out of bounds read attempt
RuleID : 44638 - Type : PROTOCOL-RPC - Revision : 1
2017-11-21 Linux kernel nfsd nfsd4_layout_verify out of bounds read attempt
RuleID : 44637 - Type : PROTOCOL-RPC - Revision : 1
2017-10-10 Linux kernel sctp_rcv_ootb invalid chunk length DoS attempt
RuleID : 44309 - Type : OS-LINUX - Revision : 1
2017-10-10 Linux kernel sctp_rcv_ootb invalid chunk length DoS attempt
RuleID : 44308 - Type : OS-LINUX - Revision : 1
2017-08-24 Linux kernel SCTP invalid chunk length denial of service attempt
RuleID : 43692 - Type : OS-LINUX - Revision : 1
2017-07-18 Linux kernel NFSv3 malformed WRITE arbitrary memory read attempt
RuleID : 43189 - Type : PROTOCOL-RPC - Revision : 2
2017-07-18 Linux kernel NFSv2 malformed WRITE arbitrary memory read attempt
RuleID : 43188 - Type : PROTOCOL-RPC - Revision : 2
2017-05-04 Foscam IP Camera command injection attempt
RuleID : 42434 - Type : SERVER-WEBAPP - Revision : 7
2017-05-04 Foscam IP Camera command injection attempt
RuleID : 42433 - Type : SERVER-WEBAPP - Revision : 7
2017-05-04 Foscam IP Camera command injection attempt
RuleID : 42432 - Type : SERVER-WEBAPP - Revision : 8
2017-01-18 Linux net af_packet.c tpacket version race condition use after free attempt
RuleID : 41028 - Type : OS-LINUX - Revision : 2
2017-01-18 Linux net af_packet.c tpacket version race condition use after free attempt
RuleID : 41027 - Type : OS-LINUX - Revision : 2

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-17 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2019-509c133845.nasl - Type: ACT_GATHER_INFO
2019-01-17 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2019-f812c9fb22.nasl - Type: ACT_GATHER_INFO
2019-01-15 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2019-337484d88b.nasl - Type: ACT_GATHER_INFO
2019-01-15 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2019-b0f7a7b74b.nasl - Type: ACT_GATHER_INFO
2019-01-14 Name: The remote Virtuozzo host is missing multiple security updates.
File: Virtuozzo_VZA-2016-104.nasl - Type: ACT_GATHER_INFO
2019-01-14 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2019-1145.nasl - Type: ACT_GATHER_INFO
2019-01-11 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZA-2018-072.nasl - Type: ACT_GATHER_INFO
2019-01-11 Name: The remote Virtuozzo host is missing multiple security updates.
File: Virtuozzo_VZA-2018-075.nasl - Type: ACT_GATHER_INFO
2019-01-11 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZA-2018-077.nasl - Type: ACT_GATHER_INFO
2019-01-11 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZA-2018-085.nasl - Type: ACT_GATHER_INFO
2019-01-11 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZA-2018-089.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2019-1145.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_184R1.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2018-0edb45d9db.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2018-1621b2204a.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2018-2645eb8dab.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2018-272cf2f9f4.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2018-2c6bd93875.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2018-3857a8b41a.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-50075276e8.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-537c8312fc.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2018-5453baa4af.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2018-5904d0794d.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5926c0ffc8.nasl - Type: ACT_GATHER_INFO