rpm package
suse/kernel-docs&distro=SUSE Linux Enterprise Software Development Kit 12 SP1
pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1
Vulnerabilities (131)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2016-7117 | Cri | 9.8 | < 3.12.74-60.64.40.4 | 3.12.74-60.64.40.4 | Oct 10, 2016 | Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing. | |
| CVE-2015-8956 | Med | 6.1 | < 3.12.67-60.64.18.3 | 3.12.67-60.64.18.3 | Oct 10, 2016 | The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket. | |
| CVE-2016-6480 | Med | 5.1 | < 3.12.67-60.64.18.3 | 3.12.67-60.64.18.3 | Aug 6, 2016 | Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability. | |
| CVE-2016-5696 | Med | 4.8 | < 3.12.67-60.64.18.3 | 3.12.67-60.64.18.3 | Aug 6, 2016 | net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack. | |
| CVE-2016-3070 | Hig | 7.8 | < 3.12.74-60.64.40.4 | 3.12.74-60.64.40.4 | Aug 6, 2016 | The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified | |
| CVE-2016-6130 | Med | 4.7 | < 3.12.67-60.64.18.3 | 3.12.67-60.64.18.3 | Jul 3, 2016 | Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability. | |
| CVE-2016-4997 | Hig | 7.8 | < 3.12.59-60.45.4 | 3.12.59-60.45.4 | Jul 3, 2016 | The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a c | |
| CVE-2016-5829 | Hig | 7.8 | < 3.12.62-60.62.3 | 3.12.62-60.62.3 | Jun 27, 2016 | Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES i | |
| CVE-2016-5828 | Hig | 7.8 | < 3.12.62-60.62.3 | 3.12.62-60.62.3 | Jun 27, 2016 | The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly | |
| CVE-2016-5244 | Hig | 7.5 | < 3.12.62-60.62.3 | 3.12.62-60.62.3 | Jun 27, 2016 | The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message. | |
| CVE-2016-5243 | Med | 5.5 | < 3.12.74-60.64.40.4 | 3.12.74-60.64.40.4 | Jun 27, 2016 | The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message. | |
| CVE-2016-4470 | Med | 5.5 | < 3.12.62-60.62.3 | 3.12.62-60.62.3 | Jun 27, 2016 | The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command. | |
| CVE-2016-1583 | Hig | 7.8 | < 3.12.59-60.41.8 | 3.12.59-60.41.8 | Jun 27, 2016 | The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefau | |
| CVE-2016-0758 | Hig | 7.8 | < 3.12.62-60.62.3 | 3.12.62-60.62.3 | Jun 27, 2016 | Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data. | |
| CVE-2014-9904 | Hig | 7.8 | < 3.12.62-60.62.3 | 3.12.62-60.62.3 | Jun 27, 2016 | The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have un | |
| CVE-2016-4805 | Hig | 7.8 | < 3.12.62-60.62.3 | 3.12.62-60.62.3 | May 23, 2016 | Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to t | |
| CVE-2016-4578 | Med | 5.5 | < 3.12.62-60.62.3 | 3.12.62-60.62.3 | May 23, 2016 | sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) sn | |
| CVE-2016-4569 | Med | 5.5 | < 3.12.59-60.41.8 | 3.12.59-60.41.8 | May 23, 2016 | The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface. | |
| CVE-2016-4565 | Hig | 7.8 | < 3.12.62-60.62.3 | 3.12.62-60.62.3 | May 23, 2016 | The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface. | |
| CVE-2016-4486 | Low | 3.3 | < 3.12.59-60.41.8 | 3.12.59-60.41.8 | May 23, 2016 | The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message. |
- affected < 3.12.74-60.64.40.4fixed 3.12.74-60.64.40.4
Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
- affected < 3.12.67-60.64.18.3fixed 3.12.67-60.64.18.3
The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.
- affected < 3.12.67-60.64.18.3fixed 3.12.67-60.64.18.3
Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
- affected < 3.12.67-60.64.18.3fixed 3.12.67-60.64.18.3
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
- affected < 3.12.74-60.64.40.4fixed 3.12.74-60.64.40.4
The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified
- affected < 3.12.67-60.64.18.3fixed 3.12.67-60.64.18.3
Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.
- affected < 3.12.59-60.45.4fixed 3.12.59-60.45.4
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a c
- affected < 3.12.62-60.62.3fixed 3.12.62-60.62.3
Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES i
- affected < 3.12.62-60.62.3fixed 3.12.62-60.62.3
The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly
- affected < 3.12.62-60.62.3fixed 3.12.62-60.62.3
The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.
- affected < 3.12.74-60.64.40.4fixed 3.12.74-60.64.40.4
The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
- affected < 3.12.62-60.62.3fixed 3.12.62-60.62.3
The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
- affected < 3.12.59-60.41.8fixed 3.12.59-60.41.8
The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefau
- affected < 3.12.62-60.62.3fixed 3.12.62-60.62.3
Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.
- affected < 3.12.62-60.62.3fixed 3.12.62-60.62.3
The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have un
- affected < 3.12.62-60.62.3fixed 3.12.62-60.62.3
Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to t
- affected < 3.12.62-60.62.3fixed 3.12.62-60.62.3
sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) sn
- affected < 3.12.59-60.41.8fixed 3.12.59-60.41.8
The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.
- affected < 3.12.62-60.62.3fixed 3.12.62-60.62.3
The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
- affected < 3.12.59-60.41.8fixed 3.12.59-60.41.8
The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
Page 4 of 7