VYPR

rpm package

suse/kgraft-patch-SLE12_Update_11&distro=SUSE Linux Enterprise Live Patching 12

pkg:rpm/suse/kgraft-patch-SLE12_Update_11&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012

Vulnerabilities (6)

  • CVE-2016-2384MedApr 27, 2016
    affected < 3-2.1fixed 3-2.1

    Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.

  • CVE-2016-0774MedApr 27, 2016
    affected < 3-2.1fixed 3-2.1

    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side

  • CVE-2015-8812CriApr 27, 2016
    affected < 3-2.1fixed 3-2.1

    drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.

  • CVE-2016-0728HigFeb 8, 2016
    affected < 1-2.3fixed 1-2.3

    The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyc

  • CVE-2015-8709HigFeb 8, 2016
    affected < 3-2.1fixed 3-2.1

    kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. N

  • CVE-2013-7446MedDec 28, 2015
    affected < 2-2.1fixed 2-2.1

    Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.