VYPR

rpm package

suse/kgraft-patch-SLE12_Update_10&distro=SUSE Linux Enterprise Live Patching 12

pkg:rpm/suse/kgraft-patch-SLE12_Update_10&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012

Vulnerabilities (14)

  • CVE-2016-2384MedApr 27, 2016
    affected < 4-2.1fixed 4-2.1

    Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.

  • CVE-2016-0774MedApr 27, 2016
    affected < 4-2.1fixed 4-2.1

    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side

  • CVE-2015-8812CriApr 27, 2016
    affected < 4-2.1fixed 4-2.1

    drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.

  • CVE-2015-8550HigApr 14, 2016
    affected < 1-2.1fixed 1-2.1

    Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.

  • CVE-2015-8552MedApr 13, 2016
    affected < 1-2.1fixed 1-2.1

    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with a

  • CVE-2015-8551MedApr 13, 2016
    affected < 1-2.1fixed 1-2.1

    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with ac

  • CVE-2016-0728HigFeb 8, 2016
    affected < 2-2.1fixed 2-2.1

    The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyc

  • CVE-2015-8709HigFeb 8, 2016
    affected < 4-2.1fixed 4-2.1

    kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. N

  • CVE-2015-8575MedFeb 8, 2016
    affected < 1-2.1fixed 1-2.1

    The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.

  • CVE-2015-8539HigFeb 8, 2016
    affected < 1-2.1fixed 1-2.1

    The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/key

  • CVE-2015-7550MedFeb 8, 2016
    affected < 1-2.1fixed 1-2.1

    The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted app

  • CVE-2015-8569LowDec 28, 2015
    affected < 1-2.1fixed 1-2.1

    The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted applic

  • CVE-2015-8543HigDec 28, 2015
    affected < 1-2.1fixed 1-2.1

    The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash)

  • CVE-2013-7446MedDec 28, 2015
    affected < 3-2.1fixed 3-2.1

    Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.