VYPR

rpm package

suse/kgraft-patch-SLE12-SP1_Update_7&distro=SUSE Linux Enterprise Live Patching 12

pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012

Vulnerabilities (32)

  • CVE-2016-4805HigMay 23, 2016
    affected < 1-4.2fixed 1-4.2

    Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to t

  • CVE-2016-4578MedMay 23, 2016
    affected < 1-4.2fixed 1-4.2

    sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) sn

  • CVE-2016-4569MedMay 23, 2016
    affected < 1-4.2fixed 1-4.2

    The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.

  • CVE-2016-4565HigMay 23, 2016
    affected < 1-4.2fixed 1-4.2

    The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.

  • CVE-2016-4486LowMay 23, 2016
    affected < 1-4.2fixed 1-4.2

    The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

  • CVE-2016-4482MedMay 23, 2016
    affected < 1-4.2fixed 1-4.2

    The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.

  • CVE-2016-2053MedMay 2, 2016
    affected < 1-4.2fixed 1-4.2

    The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/pub

  • CVE-2016-3672HigApr 27, 2016
    affected < 1-4.2fixed 1-4.2

    The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection

  • CVE-2015-8845MedApr 27, 2016
    affected < 1-4.2fixed 1-4.2

    The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exceptio

  • CVE-2015-8552MedApr 13, 2016
    affected < 1-4.2fixed 1-4.2

    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with a

  • CVE-2015-8551MedApr 13, 2016
    affected < 1-4.2fixed 1-4.2

    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with ac

  • CVE-2015-7833Oct 19, 2015
    affected < 1-4.2fixed 1-4.2

    The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.

Page 2 of 2