VYPR

rpm package

suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE Linux Enterprise Live Patching 12

pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012

Vulnerabilities (4)

  • CVE-2017-18075Jan 24, 2018
    affected < 4-2.1fixed 4-2.1

    crypto/pcrypt.c in the Linux kernel before 4.14.13 mishandles freeing instances, allowing a local user able to access the AF_ALG-based AEAD interface (CONFIG_CRYPTO_USER_API_AEAD) and pcrypt (CONFIG_CRYPTO_PCRYPT) to cause a denial of service (kfree of an incorrect pointer) or po

  • CVE-2017-17712HigDec 16, 2017
    affected < 3-2.1fixed 3-2.1

    The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.

  • CVE-2017-1000405HigNov 30, 2017
    affected < 1-4.1fixed 1-4.1

    The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_

  • CVE-2017-16939HigNov 24, 2017
    affected < 1-4.1fixed 1-4.1

    The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink message