rpm package
suse/kernel-xen&distro=SUSE Linux Enterprise Server for SAP Applications 12
pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012
Vulnerabilities (168)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-1000112 | Hig | 7.0 | < 3.12.61-52.86.1 | 3.12.61-52.86.1 | Oct 5, 2017 | Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which lea | |
| CVE-2017-1000111 | Hig | 7.8 | < 3.12.61-52.86.1 | 3.12.61-52.86.1 | Oct 5, 2017 | Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET | |
| CVE-2017-7533 | Hig | 7.0 | < 3.12.61-52.83.1 | 3.12.61-52.83.1 | Aug 5, 2017 | Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename funct | |
| CVE-2017-1000364 | Hig | 7.4 | < 3.12.61-52.77.1 | 3.12.61-52.77.1 | Jun 19, 2017 | An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduce | |
| CVE-2017-7616 | Med | 5.5 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Apr 10, 2017 | Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation. | |
| CVE-2017-2671 | Med | 5.5 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Apr 5, 2017 | The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the | |
| CVE-2017-7308 | Hig | 7.8 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Mar 29, 2017 | The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_N | |
| CVE-2017-7294 | Hig | 7.8 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Mar 29, 2017 | The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (s | |
| CVE-2017-7261 | Med | 5.5 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Mar 24, 2017 | The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic | |
| CVE-2017-5897 | Cri | 9.8 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Mar 23, 2017 | The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access. | |
| CVE-2017-7187 | Hig | 7.8 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Mar 20, 2017 | The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bound | |
| CVE-2017-7184 | Hig | 7.8 | < 3.12.61-52.69.2 | 3.12.61-52.69.2 | Mar 19, 2017 | The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by | |
| CVE-2017-2636 | Hig | 7.0 | < 3.12.61-52.69.2 | 3.12.61-52.69.2 | Mar 7, 2017 | Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline. | |
| CVE-2016-10200 | Hig | 7.0 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Mar 7, 2017 | Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED stat | |
| CVE-2017-6353 | Med | 5.5 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Mar 1, 2017 | net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerab | |
| CVE-2017-6348 | Med | 5.5 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Mar 1, 2017 | The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices. | |
| CVE-2017-6346 | Hig | 7.0 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Mar 1, 2017 | Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls. | |
| CVE-2017-6345 | Hig | 7.8 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Mar 1, 2017 | The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls. | |
| CVE-2017-5669 | Hig | 7.8 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Feb 24, 2017 | The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by makin | |
| CVE-2017-6214 | Hig | 7.5 | < 3.12.61-52.72.1 | 3.12.61-52.72.1 | Feb 23, 2017 | The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag. |
- affected < 3.12.61-52.86.1fixed 3.12.61-52.86.1
Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which lea
- affected < 3.12.61-52.86.1fixed 3.12.61-52.86.1
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET
- affected < 3.12.61-52.83.1fixed 3.12.61-52.83.1
Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename funct
- affected < 3.12.61-52.77.1fixed 3.12.61-52.77.1
An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduce
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_N
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (s
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bound
- affected < 3.12.61-52.69.2fixed 3.12.61-52.69.2
The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by
- affected < 3.12.61-52.69.2fixed 3.12.61-52.69.2
Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED stat
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerab
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by makin
- affected < 3.12.61-52.72.1fixed 3.12.61-52.72.1
The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.
Page 1 of 9