- Home
- CVEs with nessus.description==The+SUSE+Linux+Enterprise+12+kernel+was+updated+to+3.12.44+to+receive+various+security+and+bugfixes.%0A%0AThese+features+were+added+%3A%0A%0A++-+mpt2sas%3A+Added+Reply+Descriptor+Post+Queue+%28RDPQ%29+Array+++++support+%28bsc%23854824%29.%0A%0A++-+mpt3sas%3A+Bump+mpt3sas+driver+version+to+04.100.00.00+++++%28bsc%23854817%29.%0A%0AFollowing+security+bugs+were+fixed+%3A%0A%0A++-+CVE-2015-1805%3A+iov+overrun+for+failed+atomic+copy+could+++++have+lead+to+DoS+or+privilege+escalation+%28bsc%23933429%29.%0A%0A++-+CVE-2015-3212%3A+A+race+condition+in+the+way+the+Linux+++++kernel+handled+lists+of+associations+in+SCTP+sockets+++++could+have+lead+to+list+corruption+and+kernel+panics+++++%28bsc%23936502%29.%0A%0A++-+CVE-2015-4036%3A+DoS+via+memory+corruption+in+vhost%2Fscsi+++++driver+%28bsc%23931988%29.%0A%0A++-+CVE-2015-4167%3A+Linux+kernel+built+with+the+UDF+file+++++system%28CONFIG_UDF_FS%29+support+was+vulnerable+to+a+crash.%0A++++It+occurred+while+fetching+inode+information+from+a+++++corrupted%2Fmalicious+udf+file+system+image+%28bsc%23933907%29.%0A%0A++-+CVE-2015-4692%3A+DoS+via+NULL+pointer+dereference+in+++++kvm_apic_has_events+function+%28bsc%23935542%29.%0A%0A++-+CVE-2015-5364%3A+Remote+DoS+via+flood+of+UDP+packets+with+++++invalid+checksums+%28bsc%23936831%29.%0A%0A++-+CVE-2015-5366%3A+Remote+DoS+of+EPOLLET+epoll+applications+++++via+flood+of+UDP+packets+with+invalid+checksums+++++%28bsc%23936831%29.%0A%0ASecurity+issues+already+fixed+in+the+previous+update+but+not+referenced+by+CVE+%3A%0A%0A++-+CVE-2014-9728%3A+Kernel+built+with+the+UDF+file+++++system%28CONFIG_UDF_FS%29+support+were+vulnerable+to+a+crash+++++%28bsc%23933904%29.%0A%0A++-+CVE-2014-9729%3A+Kernel+built+with+the+UDF+file+++++system%28CONFIG_UDF_FS%29+support+were+vulnerable+to+a+crash+++++%28bsc%23933904%29.%0A%0A++-+CVE-2014-9730%3A+Kernel+built+with+the+UDF+file+++++system%28CONFIG_UDF_FS%29+support+were+vulnerable+to+a+crash+++++%28bsc%23933904%29.%0A%0A++-+CVE-2014-9731%3A+Kernel+built+with+the+UDF+file+++++system%28CONFIG_UDF_FS%29+support+were+vulnerable+to+++++information+leakage+%28bsc%23933896%29.%0A%0AThe+update+package+also+includes+non-security+fixes.+See+advisory+for+details.%0A%0ANote+that+Tenable+Network+Security+has+extracted+the+preceding+description+block+directly+from+the+SUSE+security+advisory.+Tenable+has+attempted+to+automatically+clean+and+format+it+as+much+as+possible+without+introducing+additional+issues
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top