VYPR

rpm package

suse/kernel-syms&distro=SUSE Linux Enterprise Server 12 SP1

pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1

Vulnerabilities (131)

  • CVE-2016-9084HigNov 28, 2016
    affected < 3.12.69-60.64.29.1fixed 3.12.69-60.64.29.1

    drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.

  • CVE-2016-9083HigNov 28, 2016
    affected < 3.12.69-60.64.29.1fixed 3.12.69-60.64.29.1

    drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl

  • CVE-2016-8645MedNov 28, 2016
    affected < 3.12.69-60.64.29.1fixed 3.12.69-60.64.29.1

    The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.

  • CVE-2016-8633MedNov 28, 2016
    affected < 3.12.69-60.64.29.1fixed 3.12.69-60.64.29.1

    drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.

  • CVE-2016-8632HigNov 28, 2016
    affected < 3.12.67-60.64.21.1fixed 3.12.67-60.64.21.1

    The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflo

  • CVE-2016-7914MedNov 16, 2016
    affected < 3.12.69-60.64.29.1fixed 3.12.69-60.64.29.1

    The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference

  • CVE-2016-7913HigNov 16, 2016
    affected < 3.12.69-60.64.29.1fixed 3.12.69-60.64.29.1

    The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.

  • CVE-2016-7911HigNov 16, 2016
    affected < 3.12.69-60.64.29.1fixed 3.12.69-60.64.29.1

    Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.

  • CVE-2016-7910HigNov 16, 2016
    affected < 3.12.69-60.64.29.1fixed 3.12.69-60.64.29.1

    Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.

  • CVE-2015-8964MedNov 16, 2016
    affected < 3.12.69-60.64.29.1fixed 3.12.69-60.64.29.1

    The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.

  • CVE-2015-8963HigNov 16, 2016
    affected < 3.12.69-60.64.29.1fixed 3.12.69-60.64.29.1

    Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.

  • CVE-2015-8962HigNov 16, 2016
    affected < 3.12.69-60.64.29.1fixed 3.12.69-60.64.29.1

    Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.

  • CVE-2016-5195HigKEVNov 10, 2016
    affected < 3.12.62-60.64.8.2fixed 3.12.62-60.64.8.2

    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

  • CVE-2016-8666HigOct 16, 2016
    affected < 3.12.67-60.64.18.1fixed 3.12.67-60.64.18.1

    The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers

  • CVE-2016-8658MedOct 16, 2016
    affected < 3.12.67-60.64.18.1fixed 3.12.67-60.64.18.1

    Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long

  • CVE-2016-7425HigOct 16, 2016
    affected < 3.12.67-60.64.18.1fixed 3.12.67-60.64.18.1

    The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_W

  • CVE-2016-7097MedOct 16, 2016
    affected < 3.12.67-60.64.18.1fixed 3.12.67-60.64.18.1

    The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.

  • CVE-2016-7042MedOct 16, 2016
    affected < 3.12.67-60.64.18.1fixed 3.12.67-60.64.18.1

    The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory co

  • CVE-2016-6828MedOct 16, 2016
    affected < 3.12.67-60.64.18.1fixed 3.12.67-60.64.18.1

    The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a c

  • CVE-2016-6327MedOct 16, 2016
    affected < 3.12.67-60.64.18.1fixed 3.12.67-60.64.18.1

    drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.

Page 3 of 7