- Home
- CVEs with nessus.description==The SUSE Linux Enterprise 12 kernel was updated to version 3.12.43 to
receive various security and bugfixes.
Following security bugs were fixed :
- CVE-2014-3647: arch/x86/kvm/emulate.c in the KVM
subsystem in the Linux kernel through 3.17.2 did not
properly perform RIP changes, which allowed guest OS
users to cause a denial of service (guest OS crash) via
a crafted application (bsc#899192).
- CVE-2014-8086: Race condition in the
ext4_file_write_iter function in fs/ext4/file.c in the
Linux kernel through 3.17 allowed local users to cause a
denial of service (file unavailability) via a
combination of a write action and an F_SETFL fcntl
operation for the O_DIRECT flag (bsc#900881).
- CVE-2014-8159: The InfiniBand (IB) implementation did
not properly restrict use of User Verbs for registration
of memory regions, which allowed local users to access
arbitrary physical memory locations, and consequently
cause a denial of service (system crash) or gain
privileges, by leveraging permissions on a uverbs device
under /dev/infiniband/ (bsc#914742).
- CVE-2015-1465: The IPv4 implementation in the Linux
kernel before 3.18.8 did not properly consider the
length of the Read-Copy Update (RCU) grace period for
redirecting lookups in the absence of caching, which
allowed remote attackers to cause a denial of service
(memory consumption or system crash) via a flood of
packets (bsc#916225).
- CVE-2015-2041: net/llc/sysctl_net_llc.c in the Linux
kernel before 3.19 used an incorrect data type in a
sysctl table, which allowed local users to obtain
potentially sensitive information from kernel memory or
possibly have unspecified other impact by accessing a
sysctl entry (bsc#919007).
- CVE-2015-2042: net/rds/sysctl.c in the Linux kernel
before 3.19 used an incorrect data type in a sysctl
table, which allowed local users to obtain potentially
sensitive information from kernel memory or possibly
have unspecified other impact by accessing a sysctl
entry (bsc#919018).
- CVE-2015-2666: Fixed a flaw that allowed crafted
microcode to overflow the kernel stack (bsc#922944).
- CVE-2015-2830: Fixed int80 fork from 64-bit tasks
mishandling (bsc#926240).
- CVE-2015-2922: Fixed possible denial of service (DoS)
attack against IPv6 network stacks due to improper
handling of Router Advertisements (bsc#922583).
- CVE-2015-3331: Fixed buffer overruns in RFC4106
implementation using AESNI (bsc#927257).
- CVE-2015-3332: Fixed TCP Fast Open local DoS
(bsc#928135).
- CVE-2015-3339: Fixed race condition flaw between the
chown() and execve() system calls which could have lead
to local privilege escalation (bsc#928130).
- CVE-2015-3636: Fixed use-after-free in ping sockets
which could have lead to local privilege escalation
(bsc#929525).
The update package also includes non-security fixes. See advisory for
details.
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top