VYPR

rpm package

suse/kgraft-patch-SLE12_Update_21&distro=SUSE Linux Enterprise Server for SAP Applications 12

pkg:rpm/suse/kgraft-patch-SLE12_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012

Vulnerabilities (29)

  • CVE-2017-7533HigAug 5, 2017
    affected < 3-2.1fixed 3-2.1

    Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename funct

  • CVE-2017-1000364HigJun 19, 2017
    affected < 2-3.1fixed 2-3.1

    An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduce

  • CVE-2017-9242MedMay 27, 2017
    affected < 3-2.1fixed 3-2.1

    The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.

  • CVE-2017-7645HigApr 18, 2017
    affected < 3-2.1fixed 3-2.1

    The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.

  • CVE-2017-7616MedApr 10, 2017
    affected < 1-2.1fixed 1-2.1

    Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.

  • CVE-2017-2671MedApr 5, 2017
    affected < 1-2.1fixed 1-2.1

    The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the

  • CVE-2017-7308HigMar 29, 2017
    affected < 1-2.1fixed 1-2.1

    The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_N

  • CVE-2017-7294HigMar 29, 2017
    affected < 1-2.1fixed 1-2.1

    The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (s

  • CVE-2017-7261MedMar 24, 2017
    affected < 1-2.1fixed 1-2.1

    The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic

  • CVE-2017-5897CriMar 23, 2017
    affected < 1-2.1fixed 1-2.1

    The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.

  • CVE-2017-7187HigMar 20, 2017
    affected < 1-2.1fixed 1-2.1

    The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bound

  • CVE-2016-10200HigMar 7, 2017
    affected < 1-2.1fixed 1-2.1

    Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED stat

  • CVE-2017-6353MedMar 1, 2017
    affected < 1-2.1fixed 1-2.1

    net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerab

  • CVE-2017-6348MedMar 1, 2017
    affected < 1-2.1fixed 1-2.1

    The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.

  • CVE-2017-6346HigMar 1, 2017
    affected < 1-2.1fixed 1-2.1

    Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.

  • CVE-2017-6345HigMar 1, 2017
    affected < 1-2.1fixed 1-2.1

    The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.

  • CVE-2017-5669HigFeb 24, 2017
    affected < 1-2.1fixed 1-2.1

    The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by makin

  • CVE-2017-6214HigFeb 23, 2017
    affected < 1-2.1fixed 1-2.1

    The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.

  • CVE-2017-6074HigFeb 18, 2017
    affected < 1-2.1fixed 1-2.1

    The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that

  • CVE-2017-5986MedFeb 18, 2017
    affected < 1-2.1fixed 1-2.1

    Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.

Page 1 of 2

VYPR — Vulnerability Intelligence