VYPR

rpm package

suse/kernel-source&distro=SUSE Linux Enterprise Server 12-LTSS

pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS

Vulnerabilities (221)

  • CVE-2017-2636HigMar 7, 2017
    affected < 3.12.61-52.69.2fixed 3.12.61-52.69.2

    Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.

  • CVE-2016-10200HigMar 7, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED stat

  • CVE-2017-6353MedMar 1, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerab

  • CVE-2017-6348MedMar 1, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.

  • CVE-2017-6346HigMar 1, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.

  • CVE-2017-6345HigMar 1, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.

  • CVE-2017-5669HigFeb 24, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by makin

  • CVE-2017-6214HigFeb 23, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.

  • CVE-2017-6074HigFeb 18, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that

  • CVE-2017-5986MedFeb 18, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.

  • CVE-2017-5970HigFeb 14, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.

  • CVE-2016-10044HigFeb 7, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.

  • CVE-2017-5551MedFeb 6, 2017
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on exec

  • CVE-2017-2583HigFeb 6, 2017
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a "MOV SS, NULL selector" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted app

  • CVE-2016-10208MedFeb 6, 2017
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.

  • CVE-2017-2584HigJan 15, 2017
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.

  • CVE-2016-8399HigJan 12, 2017
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and curren

  • CVE-2016-10088HigDec 30, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by lever

  • CVE-2016-9806HigDec 28, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a

  • CVE-2016-9794HigDec 28, 2016
    affected < 3.12.60-52.63.1fixed 3.12.60-52.63.1

    Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START comm

Page 9 of 12