Suse

Suse Linux Enterprise Server

131 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.06%
  • Veröffentlicht 10.11.2014 11:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.

Exploit
  • EPSS 0.08%
  • Veröffentlicht 10.11.2014 11:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereferenc...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 10.11.2014 11:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or p...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS...

  • EPSS 0.1%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

  • EPSS 0.06%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

Exploit
  • EPSS 9.8%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.

Exploit
  • EPSS 1.98%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork ...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 13.10.2014 10:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_...

Exploit
  • EPSS 0.37%
  • Veröffentlicht 01.09.2014 01:55:18
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruptio...