VYPR

rpm package

suse/kernel-rt_trace&distro=SUSE Linux Enterprise Real Time 11 SP4

pkg:rpm/suse/kernel-rt_trace&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4

Vulnerabilities (252)

  • CVE-2016-9794HigDec 28, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START comm

  • CVE-2016-9793HigDec 28, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leverag

  • CVE-2016-9756MedDec 28, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

  • CVE-2016-9685MedDec 28, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.

  • CVE-2016-9576HigDec 28, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access

  • CVE-2012-6704HigDec 28, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging

  • CVE-2016-9555CriNov 28, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP

  • CVE-2016-8646MedNov 28, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.

  • CVE-2016-8633MedNov 28, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.

  • CVE-2016-8632HigNov 28, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflo

  • CVE-2015-8970MedNov 28, 2016
    affected < 3.0.101.rt130-69.5.1fixed 3.0.101.rt130-69.5.1

    crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via

  • CVE-2016-7916MedNov 16, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is inc

  • CVE-2016-7915MedNov 16, 2016
    affected < 3.0.101.rt130-69.24.1fixed 3.0.101.rt130-69.24.1

    The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech D

  • CVE-2016-7911HigNov 16, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.

  • CVE-2016-7910HigNov 16, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.

  • CVE-2015-8964MedNov 16, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.

  • CVE-2015-8962HigNov 16, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.

  • CVE-2016-5195HigKEVNov 10, 2016
    affected < 3.0.101.rt130-65.1fixed 3.0.101.rt130-65.1

    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

  • CVE-2016-7425HigOct 16, 2016
    affected < 3.0.101.rt130-65.1fixed 3.0.101.rt130-65.1

    The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_W

  • CVE-2016-7097MedOct 16, 2016
    affected < 3.0.101.rt130-68.1fixed 3.0.101.rt130-68.1

    The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.

Page 8 of 13