VYPR

rpm package

suse/kgraft-patch-SLE12-SP1_Update_2&distro=SUSE Linux Enterprise Live Patching 12

pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012

Vulnerabilities (27)

  • CVE-2016-0774MedApr 27, 2016
    affected < 3-2.1fixed 3-2.1

    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side

  • CVE-2015-8816MedApr 27, 2016
    affected < 4-2.1fixed 4-2.1

    The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspe

  • CVE-2015-8812CriApr 27, 2016
    affected < 3-2.1fixed 3-2.1

    drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.

  • CVE-2016-0728HigFeb 8, 2016
    affected < 1-2.2fixed 1-2.2

    The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyc

  • CVE-2015-8709HigFeb 8, 2016
    affected < 3-2.1fixed 3-2.1

    kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. N

  • CVE-2015-8660MedDec 28, 2015
    affected < 2-2.1fixed 2-2.1

    The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.

  • CVE-2013-7446MedDec 28, 2015
    affected < 2-2.1fixed 2-2.1

    Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.

Page 2 of 2