VYPR

apk package

chainguard/linux-azure-6.18-fips-boot-installed

pkg:apk/chainguard/linux-azure-6.18-fips-boot-installed

Vulnerabilities (87)

  • CVE-2016-3699HigOct 7, 2016
    affected < 0fixed 0

    The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

  • CVE-2016-0774MedApr 27, 2016
    affected < 0fixed 0

    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side

  • CVE-2007-4998Jan 31, 2008
    affected < 0fixed 0

    cp, when running with an option to preserve symlinks on multiple OSes, allows local, user-assisted attackers to overwrite arbitrary files via a symlink attack using crafted directories containing multiple source files that are copied to the same destination.

  • CVE-2007-2764May 18, 2007
    affected < 0fixed 0

    The embedded Linux kernel in certain Sun-Brocade SilkWorm switches before 20070516 does not properly handle a situation in which a non-root user creates a kernel process, which allows attackers to cause a denial of service (oops and device reboot) via unspecified vectors.

  • CVE-2006-2932Aug 23, 2006
    affected < 0fixed 0

    A regression error in the restore_all code path of the 4/4GB split support for non-hugemem Linux kernels on Red Hat Linux Desktop and Enterprise Linux 4 allows local users to cause a denial of service (panic) via unspecified vectors.

  • CVE-1999-0656Jan 1, 1999
    affected < 0fixed 0

    The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.

  • CVE-1999-0524Aug 1, 1997
    affected < 0fixed 0

    ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.

Page 5 of 5