Novell

Suse Linux Enterprise Server

91 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.98%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork ...

  • EPSS 94.02%
  • Veröffentlicht 15.10.2014 00:55:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 13.10.2014 10:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in bo...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 28.09.2014 10:55:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5.7 does not ensure that a keepalive action is associated with a stream socket, which allows local users to cause a denial of service (system crash) by leveraging the abilit...

  • EPSS 0.08%
  • Veröffentlicht 05.11.2013 20:55:29
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local u...

  • EPSS 11.14%
  • Veröffentlicht 19.08.2013 23:55:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

Exploit
  • EPSS 1.28%
  • Veröffentlicht 21.06.2012 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ROSE protocol implementation in the Linux kernel before 2.6.39 does not verify that certain data-length values are consistent with the amount of data sent, which might allow remote attackers to obtain sensitive information from kernel memory or c...

Exploit
  • EPSS 0.95%
  • Veröffentlicht 21.06.2012 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap m...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 13.06.2012 10:24:55
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call.

  • EPSS 0.03%
  • Veröffentlicht 18.09.2009 10:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in ia32el (aka the IA 32 emulation functionality) before 7042_7022-0.4.2 in SUSE Linux Enterprise (SLE) 10 SP2 on Itanium IA64 machines allows local users to cause a denial of service (system crash) via a 32-bit x86 applicat...