rpm package
suse/kernel-syms&distro=SUSE Manager 2.1
pkg:rpm/suse/kernel-syms&distro=SUSE%20Manager%202.1
Vulnerabilities (95)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-2636 | Hig | 7.0 | < 3.0.101-0.47.99.1 | 3.0.101-0.47.99.1 | Mar 7, 2017 | Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline. | |
| CVE-2017-5551 | Med | 4.4 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Feb 6, 2017 | The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on exec | |
| CVE-2016-8399 | Hig | 7.0 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Jan 12, 2017 | An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and curren | |
| CVE-2016-10088 | Hig | 7.0 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Dec 30, 2016 | The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by lever | |
| CVE-2016-9794 | Hig | 7.8 | < 3.0.101-0.47.93.1 | 3.0.101-0.47.93.1 | Dec 28, 2016 | Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START comm | |
| CVE-2016-9793 | Hig | 7.8 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Dec 28, 2016 | The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leverag | |
| CVE-2016-9756 | Med | 5.5 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Dec 28, 2016 | arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. | |
| CVE-2016-9685 | Med | 5.5 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Dec 28, 2016 | Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations. | |
| CVE-2016-9576 | Hig | 7.8 | < 3.0.101-0.47.93.1 | 3.0.101-0.47.93.1 | Dec 28, 2016 | The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access | |
| CVE-2012-6704 | Hig | 7.8 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Dec 28, 2016 | The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging | |
| CVE-2016-9555 | Cri | 9.8 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Nov 28, 2016 | The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP | |
| CVE-2016-8646 | Med | 5.5 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Nov 28, 2016 | The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data. | |
| CVE-2016-8633 | Med | 6.8 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Nov 28, 2016 | drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets. | |
| CVE-2016-8632 | Hig | 7.8 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Nov 28, 2016 | The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflo | |
| CVE-2015-8970 | Med | 5.5 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Nov 28, 2016 | crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via | |
| CVE-2016-7916 | Med | 5.5 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Nov 16, 2016 | Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is inc | |
| CVE-2016-7911 | Hig | 7.8 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Nov 16, 2016 | Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call. | |
| CVE-2016-7910 | Hig | 7.8 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Nov 16, 2016 | Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed. | |
| CVE-2015-8964 | Med | 5.5 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Nov 16, 2016 | The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure. | |
| CVE-2015-8962 | Hig | 7.3 | < 3.0.101-0.47.96.1 | 3.0.101-0.47.96.1 | Nov 16, 2016 | Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call. |
- affected < 3.0.101-0.47.99.1fixed 3.0.101-0.47.99.1
Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on exec
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and curren
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by lever
- affected < 3.0.101-0.47.93.1fixed 3.0.101-0.47.93.1
Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START comm
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leverag
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.
- affected < 3.0.101-0.47.93.1fixed 3.0.101-0.47.93.1
The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflo
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is inc
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.
- affected < 3.0.101-0.47.96.1fixed 3.0.101-0.47.96.1
Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.
Page 1 of 5