VYPR

rpm package

suse/kgraft-patch-SLE12-SP3_Update_5&distro=SUSE Linux Enterprise Live Patching 12 SP3

pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3

Vulnerabilities (25)

  • CVE-2017-17712HigDec 16, 2017
    affected < 2-2.1fixed 2-2.1

    The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.

  • CVE-2017-13166HigDec 6, 2017
    affected < 4-2.1fixed 4-2.1

    An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.

  • CVE-2017-1000405HigNov 30, 2017
    affected < 1-6.1fixed 1-6.1

    The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_

  • CVE-2017-16939HigNov 24, 2017
    affected < 1-6.1fixed 1-6.1

    The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink message

  • CVE-2017-0861HigNov 16, 2017
    affected < 5-2.2fixed 5-2.2

    Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.

Page 2 of 2