VYPR

rpm package

suse/kernel-syms&distro=SUSE Linux Enterprise Server 11 SP2-LTSS

pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSS

Vulnerabilities (113)

  • CVE-2015-2922May 27, 2015
    affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1

    The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA)

  • CVE-2015-2830May 27, 2015
    affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1

    arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system

  • CVE-2015-2042Apr 21, 2015
    affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1

    net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

  • CVE-2015-2041Apr 21, 2015
    affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1

    net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

  • CVE-2015-0777Apr 5, 2015
    affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1

    drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in ho

  • CVE-2015-1421Mar 16, 2015
    affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1

    Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that

  • CVE-2015-1420Mar 16, 2015
    affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1

    Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execu

  • CVE-2014-8159Mar 16, 2015
    affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1

    The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and

  • CVE-2015-2150Mar 12, 2015
    affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1

    Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a

  • CVE-2014-9683Mar 3, 2015
    affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1

    Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename

  • CVE-2014-8086MedOct 13, 2014
    affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1

    Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.

  • CVE-2013-2015Apr 29, 2013
    affected < 3.0.101-0.7.40.1fixed 3.0.101-0.7.40.1

    The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel before 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate attackers to cause a denial of service (system hang) via a crafted filesystem on removable

  • CVE-2004-0230May 5, 2004
    affected < 3.0.101-0.7.53.1fixed 3.0.101-0.7.53.1

    TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, suc

Page 6 of 6