Vulnerability & Exploit Database

Displaying entries 1 - 10 of 42 in total

Results for: CVE-2017-2584 Back to search

Ubuntu: (Multiple Advisories) (CVE-2017-2584): Linux kernel vulnerabilities Vulnerability

  • Severity: 4
  • Published: January 14, 2017

arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.

SUSE: CVE-2017-2584: SUSE Linux Security Advisory Vulnerability

  • Severity: 4
  • Published: January 14, 2017

arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.

Debian: CVE-2017-2584: linux -- security update Vulnerability

  • Severity: 4
  • Published: January 14, 2017

arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.

SUSE: CVE-2016-6327: SUSE Linux Security Advisory Vulnerability

  • Severity: 5
  • Published: October 16, 2016

drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.

SUSE: CVE-2015-8956: SUSE Linux Security Advisory Vulnerability

  • Severity: 4
  • Published: October 10, 2016

The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.

SUSE: CVE-2016-6480: SUSE Linux Security Advisory Vulnerability

  • Severity: 5
  • Published: August 06, 2016

Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.

SUSE: CVE-2016-3841: SUSE Linux Security Advisory Vulnerability

  • Severity: 7
  • Published: August 06, 2016

The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.