VYPR

rpm package

suse/kernel-source&distro=SUSE Linux Enterprise Server for SAP Applications 12

pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012

Vulnerabilities (168)

  • CVE-2016-8645MedNov 28, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.

  • CVE-2016-8633MedNov 28, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.

  • CVE-2016-8632HigNov 28, 2016
    affected < 3.12.60-52.60.1fixed 3.12.60-52.60.1

    The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflo

  • CVE-2016-7914MedNov 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference

  • CVE-2016-7913HigNov 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.

  • CVE-2016-7911HigNov 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.

  • CVE-2016-7910HigNov 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.

  • CVE-2015-8964MedNov 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.

  • CVE-2015-8963HigNov 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.

  • CVE-2015-8962HigNov 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.

  • CVE-2016-5195HigKEVNov 10, 2016
    affected < 3.12.60-52.57.1fixed 3.12.60-52.57.1

    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

  • CVE-2016-8658MedOct 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long

  • CVE-2016-7425HigOct 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_W

  • CVE-2016-7097MedOct 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.

  • CVE-2016-7042MedOct 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory co

  • CVE-2016-6828MedOct 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a c

  • CVE-2016-6327MedOct 16, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.

  • CVE-2016-7117CriOct 10, 2016
    affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1

    Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.

  • CVE-2015-8956MedOct 10, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.

  • CVE-2016-6480MedAug 6, 2016
    affected < 3.12.61-52.66.1fixed 3.12.61-52.66.1

    Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.

Page 3 of 9