VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Desktop 12 SP1

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1

Vulnerabilities (131)

  • CVE-2016-7117CriOct 10, 2016
    affected < 3.12.74-60.64.40.1fixed 3.12.74-60.64.40.1

    Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.

  • CVE-2015-8956MedOct 10, 2016
    affected < 3.12.67-60.64.18.1fixed 3.12.67-60.64.18.1

    The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.

  • CVE-2016-6480MedAug 6, 2016
    affected < 3.12.67-60.64.18.1fixed 3.12.67-60.64.18.1

    Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.

  • CVE-2016-5696MedAug 6, 2016
    affected < 3.12.67-60.64.18.1fixed 3.12.67-60.64.18.1

    net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.

  • CVE-2016-3070HigAug 6, 2016
    affected < 3.12.74-60.64.40.1fixed 3.12.74-60.64.40.1

    The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified

  • CVE-2016-6130MedJul 3, 2016
    affected < 3.12.67-60.64.18.1fixed 3.12.67-60.64.18.1

    Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.

  • CVE-2016-4997HigJul 3, 2016
    affected < 3.12.59-60.45.2fixed 3.12.59-60.45.2

    The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a c

  • CVE-2016-5829HigJun 27, 2016
    affected < 3.12.62-60.62.1fixed 3.12.62-60.62.1

    Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES i

  • CVE-2016-5828HigJun 27, 2016
    affected < 3.12.62-60.62.1fixed 3.12.62-60.62.1

    The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly

  • CVE-2016-5244HigJun 27, 2016
    affected < 3.12.62-60.62.1fixed 3.12.62-60.62.1

    The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.

  • CVE-2016-5243MedJun 27, 2016
    affected < 3.12.74-60.64.40.1fixed 3.12.74-60.64.40.1

    The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

  • CVE-2016-4470MedJun 27, 2016
    affected < 3.12.62-60.62.1fixed 3.12.62-60.62.1

    The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.

  • CVE-2016-1583HigJun 27, 2016
    affected < 3.12.59-60.41.2fixed 3.12.59-60.41.2

    The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefau

  • CVE-2016-0758HigJun 27, 2016
    affected < 3.12.62-60.62.1fixed 3.12.62-60.62.1

    Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.

  • CVE-2014-9904HigJun 27, 2016
    affected < 3.12.62-60.62.1fixed 3.12.62-60.62.1

    The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have un

  • CVE-2016-4805HigMay 23, 2016
    affected < 3.12.62-60.62.1fixed 3.12.62-60.62.1

    Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to t

  • CVE-2016-4578MedMay 23, 2016
    affected < 3.12.62-60.62.1fixed 3.12.62-60.62.1

    sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) sn

  • CVE-2016-4569MedMay 23, 2016
    affected < 3.12.59-60.41.2fixed 3.12.59-60.41.2

    The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.

  • CVE-2016-4565HigMay 23, 2016
    affected < 3.12.62-60.62.1fixed 3.12.62-60.62.1

    The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.

  • CVE-2016-4486LowMay 23, 2016
    affected < 3.12.59-60.41.2fixed 3.12.59-60.41.2

    The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

Page 4 of 7