rpm package
suse/ocfs2&distro=SUSE Linux Enterprise Real Time 11 SP4
pkg:rpm/suse/ocfs2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4
Vulnerabilities (38)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-11473 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | Jul 20, 2017 | Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table. | |
| CVE-2017-1000363 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | Jul 17, 2017 | Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the a | |
| CVE-2017-11176 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | Jul 11, 2017 | The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other imp | |
| CVE-2017-1000365 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | Jun 19, 2017 | The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects | |
| CVE-2017-1000380 | Med | 5.5 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | Jun 17, 2017 | sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happ | |
| CVE-2017-9242 | Med | 5.5 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | May 27, 2017 | The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls. | |
| CVE-2017-9077 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | May 19, 2017 | The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | |
| CVE-2017-9076 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | May 19, 2017 | The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | |
| CVE-2017-9075 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | May 19, 2017 | The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | |
| CVE-2017-9074 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | May 19, 2017 | The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact | |
| CVE-2017-7487 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | May 14, 2017 | The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface. | |
| CVE-2017-8925 | Med | 5.5 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | May 12, 2017 | The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling. | |
| CVE-2017-8924 | Med | 4.6 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | May 12, 2017 | The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial | |
| CVE-2016-10277 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | May 12, 2017 | An elevation of privilege vulnerability in the Motorola bootloader could enable a local malicious application to execute arbitrary code within the context of the bootloader. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may r | |
| CVE-2017-8890 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | May 10, 2017 | The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call. | |
| CVE-2014-9922 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | Apr 4, 2017 | The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c. | |
| CVE-2017-2647 | Hig | 7.8 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | Mar 31, 2017 | The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyri | |
| CVE-2017-6951 | Med | 5.5 | < 1.6-0.28.3.4 | 1.6-0.28.3.4 | Mar 16, 2017 | The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the "dead" type. |
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the a
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other imp
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happ
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling.
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
An elevation of privilege vulnerability in the Motorola bootloader could enable a local malicious application to execute arbitrary code within the context of the bootloader. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may r
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyri
- affected < 1.6-0.28.3.4fixed 1.6-0.28.3.4
The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the "dead" type.
Page 2 of 2