VYPR

rpm package

suse/kgraft-patch-SLE12-SP1_Update_3&distro=SUSE Linux Enterprise Live Patching 12

pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012

Vulnerabilities (40)

  • CVE-2016-9806HigDec 28, 2016
    affected < 7-2.1fixed 7-2.1

    Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a

  • CVE-2016-9794HigDec 28, 2016
    affected < 7-2.1fixed 7-2.1

    Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START comm

  • CVE-2016-9576HigDec 28, 2016
    affected < 7-2.1fixed 7-2.1

    The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access

  • CVE-2016-8655HigDec 8, 2016
    affected < 6-2.1fixed 6-2.1

    Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockop

  • CVE-2016-9555CriNov 28, 2016
    affected < 6-2.1fixed 6-2.1

    The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP

  • CVE-2016-8632HigNov 28, 2016
    affected < 7-2.1fixed 7-2.1

    The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflo

  • CVE-2016-5195HigKEVNov 10, 2016
    affected < 5-2.1fixed 5-2.1

    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

  • CVE-2016-8666HigOct 16, 2016
    affected < 5-2.1fixed 5-2.1

    The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers

  • CVE-2016-7117CriOct 10, 2016
    affected < 6-2.1fixed 6-2.1

    Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.

  • CVE-2016-6480MedAug 6, 2016
    affected < 4-2.1fixed 4-2.1

    Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.

  • CVE-2016-4997HigJul 3, 2016
    affected < 4-2.1fixed 4-2.1

    The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a c

  • CVE-2016-5829HigJun 27, 2016
    affected < 4-2.1fixed 4-2.1

    Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES i

  • CVE-2016-4470MedJun 27, 2016
    affected < 3-2.1fixed 3-2.1

    The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.

  • CVE-2016-1583HigJun 27, 2016
    affected < 3-2.1fixed 3-2.1

    The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefau

  • CVE-2016-0758HigJun 27, 2016
    affected < 3-2.1fixed 3-2.1

    Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.

  • CVE-2016-4565HigMay 23, 2016
    affected < 3-2.1fixed 3-2.1

    The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.

  • CVE-2016-2053MedMay 2, 2016
    affected < 3-2.1fixed 3-2.1

    The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/pub

  • CVE-2016-3134HigApr 27, 2016
    affected < 3-2.1fixed 3-2.1

    The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

  • CVE-2016-2384MedApr 27, 2016
    affected < 2-2.1fixed 2-2.1

    Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.

  • CVE-2016-2069HigApr 27, 2016
    affected < 1-2.1fixed 1-2.1

    Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.

Page 1 of 2

VYPR — Vulnerability Intelligence