VYPR

rpm package

suse/kgraft-patch-SLE12_Update_16&distro=SUSE Linux Enterprise Server 12-LTSS

pkg:rpm/suse/kgraft-patch-SLE12_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS

Vulnerabilities (18)

  • CVE-2017-15274MedOct 12, 2017
    affected < 10-4.1fixed 10-4.1

    security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call,

  • CVE-2017-1000112HigOct 5, 2017
    affected < 9-2.2fixed 9-2.2

    Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which lea

  • CVE-2017-1000251HigSep 12, 2017
    affected < 10-4.1fixed 10-4.1

    The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel spa

  • CVE-2017-7533HigAug 5, 2017
    affected < 8-2.1fixed 8-2.1

    Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename funct

  • CVE-2017-1000364HigJun 19, 2017
    affected < 7-3.1fixed 7-3.1

    An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduce

  • CVE-2017-9242MedMay 27, 2017
    affected < 8-2.1fixed 8-2.1

    The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.

  • CVE-2017-7645HigApr 18, 2017
    affected < 8-2.1fixed 8-2.1

    The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.

  • CVE-2017-7308HigMar 29, 2017
    affected < 6-2.1fixed 6-2.1

    The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_N

  • CVE-2017-7184HigMar 19, 2017
    affected < 5-2.1fixed 5-2.1

    The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by

  • CVE-2017-2636HigMar 7, 2017
    affected < 8-2.1fixed 8-2.1

    Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.

  • CVE-2017-5970HigFeb 14, 2017
    affected < 4-2.1fixed 4-2.1

    The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.

  • CVE-2016-9806HigDec 28, 2016
    affected < 3-2.1fixed 3-2.1

    Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a

  • CVE-2016-9794HigDec 28, 2016
    affected < 3-2.1fixed 3-2.1

    Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START comm

  • CVE-2016-9576HigDec 28, 2016
    affected < 3-2.1fixed 3-2.1

    The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access

  • CVE-2016-8655HigDec 8, 2016
    affected < 2-2.1fixed 2-2.1

    Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockop

  • CVE-2016-9555CriNov 28, 2016
    affected < 2-2.1fixed 2-2.1

    The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP

  • CVE-2016-8632HigNov 28, 2016
    affected < 3-2.1fixed 3-2.1

    The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflo

  • CVE-2016-5195HigKEVNov 10, 2016
    affected < 1-2.1fixed 1-2.1

    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."