rpm package
suse/kernel-default&distro=SUSE Linux Enterprise Server 11 SP3-TERADATA
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATA
Vulnerabilities (13)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2015-5366 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | Aug 31, 2015 | The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a differ | ||
| CVE-2015-5364 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | Aug 31, 2015 | The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood. | ||
| CVE-2015-4700 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | Aug 31, 2015 | The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler. | ||
| CVE-2014-9731 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | Aug 31, 2015 | The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to | ||
| CVE-2014-9730 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | Aug 31, 2015 | The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image. | ||
| CVE-2014-9729 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | Aug 31, 2015 | The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image. | ||
| CVE-2014-9728 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | Aug 31, 2015 | The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c. | ||
| CVE-2015-1805 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | Aug 8, 2015 | The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) | ||
| CVE-2015-3636 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | Aug 6, 2015 | The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the | ||
| CVE-2015-2922 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | May 27, 2015 | The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) | ||
| CVE-2014-9710 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | May 27, 2015 | The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-re | ||
| CVE-2015-2041 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | Apr 21, 2015 | net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry. | ||
| CVE-2015-1420 | — | < 3.0.101-0.63.TDC.1 | 3.0.101-0.63.TDC.1 | Mar 16, 2015 | Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execu |
- CVE-2015-5366Aug 31, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a differ
- CVE-2015-5364Aug 31, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.
- CVE-2015-4700Aug 31, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.
- CVE-2014-9731Aug 31, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to
- CVE-2014-9730Aug 31, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
- CVE-2014-9729Aug 31, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
- CVE-2014-9728Aug 31, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.
- CVE-2015-1805Aug 8, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash)
- CVE-2015-3636Aug 6, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the
- CVE-2015-2922May 27, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA)
- CVE-2014-9710May 27, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-re
- CVE-2015-2041Apr 21, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
- CVE-2015-1420Mar 16, 2015affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1
Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execu