VYPR

rpm package

suse/kernel-syms&distro=SUSE Linux Enterprise Server 12 SP1

pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1

Vulnerabilities (131)

  • CVE-2015-8543HigDec 28, 2015
    affected < 3.12.53-60.30.1fixed 3.12.53-60.30.1

    The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash)

  • CVE-2015-7990MedDec 28, 2015
    affected < 3.12.51-60.20.2fixed 3.12.51-60.20.2

    Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. N

  • CVE-2013-7446MedDec 28, 2015
    affected < 3.12.53-60.30.1fixed 3.12.53-60.30.1

    Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.

  • CVE-2015-0272Nov 17, 2015
    affected < 3.12.51-60.20.2fixed 3.12.51-60.20.2

    GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.

  • CVE-2015-8215Nov 16, 2015
    affected < 3.12.51-60.20.2fixed 3.12.51-60.20.2

    net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) l

  • CVE-2015-7872Nov 16, 2015
    affected < 3.12.51-60.20.2fixed 3.12.51-60.20.2

    The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.

  • CVE-2015-2925Nov 16, 2015
    affected < 3.12.51-60.20.2fixed 3.12.51-60.20.2

    The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."

  • CVE-2015-7833Oct 19, 2015
    affected < 3.12.62-60.62.1fixed 3.12.62-60.62.1

    The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.

  • CVE-2015-7799Oct 19, 2015
    affected < 3.12.51-60.20.2fixed 3.12.51-60.20.2

    The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.

  • CVE-2015-5707Oct 19, 2015
    affected < 3.12.53-60.30.1fixed 3.12.53-60.30.1

    Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.

  • CVE-2015-5156Oct 19, 2015
    affected < 3.12.51-60.20.2fixed 3.12.51-60.20.2

    The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence o

Page 7 of 7