rpm package
suse/kernel-rt&distro=SUSE Linux Enterprise Real Time 11 SP4
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4
Vulnerabilities (252)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2016-9794 | Hig | 7.8 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Dec 28, 2016 | Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START comm | |
| CVE-2016-9793 | Hig | 7.8 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Dec 28, 2016 | The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leverag | |
| CVE-2016-9756 | Med | 5.5 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Dec 28, 2016 | arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. | |
| CVE-2016-9685 | Med | 5.5 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Dec 28, 2016 | Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations. | |
| CVE-2016-9576 | Hig | 7.8 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Dec 28, 2016 | The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access | |
| CVE-2012-6704 | Hig | 7.8 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Dec 28, 2016 | The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging | |
| CVE-2016-9555 | Cri | 9.8 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Nov 28, 2016 | The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP | |
| CVE-2016-8646 | Med | 5.5 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Nov 28, 2016 | The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data. | |
| CVE-2016-8633 | Med | 6.8 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Nov 28, 2016 | drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets. | |
| CVE-2016-8632 | Hig | 7.8 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Nov 28, 2016 | The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflo | |
| CVE-2015-8970 | Med | 5.5 | < 3.0.101.rt130-69.5.1 | 3.0.101.rt130-69.5.1 | Nov 28, 2016 | crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via | |
| CVE-2016-7916 | Med | 5.5 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Nov 16, 2016 | Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is inc | |
| CVE-2016-7915 | Med | 5.5 | < 3.0.101.rt130-69.24.1 | 3.0.101.rt130-69.24.1 | Nov 16, 2016 | The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech D | |
| CVE-2016-7911 | Hig | 7.8 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Nov 16, 2016 | Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call. | |
| CVE-2016-7910 | Hig | 7.8 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Nov 16, 2016 | Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed. | |
| CVE-2015-8964 | Med | 5.5 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Nov 16, 2016 | The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure. | |
| CVE-2015-8962 | Hig | 7.3 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Nov 16, 2016 | Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call. | |
| CVE-2016-5195 | Hig | 7.0 | KEV | < 3.0.101.rt130-65.1 | 3.0.101.rt130-65.1 | Nov 10, 2016 | Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW." |
| CVE-2016-7425 | Hig | 7.8 | < 3.0.101.rt130-65.1 | 3.0.101.rt130-65.1 | Oct 16, 2016 | The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_W | |
| CVE-2016-7097 | Med | 4.4 | < 3.0.101.rt130-68.1 | 3.0.101.rt130-68.1 | Oct 16, 2016 | The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. |
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START comm
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leverag
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflo
- affected < 3.0.101.rt130-69.5.1fixed 3.0.101.rt130-69.5.1
crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is inc
- affected < 3.0.101.rt130-69.24.1fixed 3.0.101.rt130-69.24.1
The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech D
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.
- affected < 3.0.101.rt130-65.1fixed 3.0.101.rt130-65.1
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
- affected < 3.0.101.rt130-65.1fixed 3.0.101.rt130-65.1
The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_W
- affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1
The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
Page 8 of 13