rpm package
suse/kernel-trace&distro=SUSE Linux Enterprise Server 11 SP2-LTSS
pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSS
Vulnerabilities (113)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2015-2922 | — | < 3.0.101-0.7.37.1 | 3.0.101-0.7.37.1 | May 27, 2015 | The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) | ||
| CVE-2015-2830 | — | < 3.0.101-0.7.37.1 | 3.0.101-0.7.37.1 | May 27, 2015 | arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system | ||
| CVE-2015-2042 | — | < 3.0.101-0.7.37.1 | 3.0.101-0.7.37.1 | Apr 21, 2015 | net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry. | ||
| CVE-2015-2041 | — | < 3.0.101-0.7.37.1 | 3.0.101-0.7.37.1 | Apr 21, 2015 | net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry. | ||
| CVE-2015-0777 | — | < 3.0.101-0.7.37.1 | 3.0.101-0.7.37.1 | Apr 5, 2015 | drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in ho | ||
| CVE-2015-1421 | — | < 3.0.101-0.7.37.1 | 3.0.101-0.7.37.1 | Mar 16, 2015 | Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that | ||
| CVE-2015-1420 | — | < 3.0.101-0.7.37.1 | 3.0.101-0.7.37.1 | Mar 16, 2015 | Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execu | ||
| CVE-2014-8159 | — | < 3.0.101-0.7.37.1 | 3.0.101-0.7.37.1 | Mar 16, 2015 | The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and | ||
| CVE-2015-2150 | — | < 3.0.101-0.7.37.1 | 3.0.101-0.7.37.1 | Mar 12, 2015 | Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a | ||
| CVE-2014-9683 | — | < 3.0.101-0.7.37.1 | 3.0.101-0.7.37.1 | Mar 3, 2015 | Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename | ||
| CVE-2014-8086 | Med | 4.7 | < 3.0.101-0.7.37.1 | 3.0.101-0.7.37.1 | Oct 13, 2014 | Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag. | |
| CVE-2013-2015 | — | < 3.0.101-0.7.40.1 | 3.0.101-0.7.40.1 | Apr 29, 2013 | The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel before 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate attackers to cause a denial of service (system hang) via a crafted filesystem on removable | ||
| CVE-2004-0230 | — | < 3.0.101-0.7.53.1 | 3.0.101-0.7.53.1 | May 5, 2004 | TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, suc |
- CVE-2015-2922May 27, 2015affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA)
- CVE-2015-2830May 27, 2015affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system
- CVE-2015-2042Apr 21, 2015affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1
net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
- CVE-2015-2041Apr 21, 2015affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1
net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
- CVE-2015-0777Apr 5, 2015affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1
drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in ho
- CVE-2015-1421Mar 16, 2015affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1
Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that
- CVE-2015-1420Mar 16, 2015affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1
Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execu
- CVE-2014-8159Mar 16, 2015affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1
The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and
- CVE-2015-2150Mar 12, 2015affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a
- CVE-2014-9683Mar 3, 2015affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename
- affected < 3.0.101-0.7.37.1fixed 3.0.101-0.7.37.1
Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.
- CVE-2013-2015Apr 29, 2013affected < 3.0.101-0.7.40.1fixed 3.0.101-0.7.40.1
The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel before 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate attackers to cause a denial of service (system hang) via a crafted filesystem on removable
- CVE-2004-0230May 5, 2004affected < 3.0.101-0.7.53.1fixed 3.0.101-0.7.53.1
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, suc
Page 6 of 6