VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Server 11 SP3-TERADATA

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATA

Vulnerabilities (13)

  • CVE-2015-5366Aug 31, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a differ

  • CVE-2015-5364Aug 31, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.

  • CVE-2015-4700Aug 31, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.

  • CVE-2014-9731Aug 31, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to

  • CVE-2014-9730Aug 31, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.

  • CVE-2014-9729Aug 31, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.

  • CVE-2014-9728Aug 31, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.

  • CVE-2015-1805Aug 8, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash)

  • CVE-2015-3636Aug 6, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the

  • CVE-2015-2922May 27, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA)

  • CVE-2014-9710May 27, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-re

  • CVE-2015-2041Apr 21, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

  • CVE-2015-1420Mar 16, 2015
    affected < 3.0.101-0.63.TDC.1fixed 3.0.101-0.63.TDC.1

    Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execu