Vulnerability & Exploit Database

Displaying all 5 entries

Results for: CVE-2017-0605 Back to search

Debian: CVE-2017-0605: linux -- security update Vulnerability

  • Severity: 9
  • Published: May 11, 2017

An elevation of privilege vulnerability in the kernel trace subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device....

SUSE: CVE-2016-7056: SUSE Linux Security Advisory Vulnerability

  • Severity: 4
  • Published: January 09, 2017

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From VID-7CAEBE30-D7F1-11E6-A9A5-B499BAEBFEAF:

Cesar Pereida Garcia reports:

The signing function in cry...

SUSE: CVE-2016-8610: SUSE Linux Security Advisory Vulnerability

  • Severity: 4
  • Published: November 01, 2016

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From VID-0FCD3AF0-A0FE-11E6-B1CF-14DAE9D210B8:

Problem Description:

Due to improper handling of alert packets, OpenSSL ...

SUSE: CVE-2016-2108: SUSE Linux Security Advisory Vulnerability

  • Severity: 10
  • Published: May 02, 2016

The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.