VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Live Patching 15

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015

Vulnerabilities (611)

  • CVE-2018-10124Apr 16, 2018
    affected < 4.12.14-25.3.1fixed 4.12.14-25.3.1

    The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.

  • CVE-2018-10087Apr 13, 2018
    affected < 4.12.14-25.3.1fixed 4.12.14-25.3.1

    The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.

  • CVE-2018-1094Apr 2, 2018
    affected < 4.12.14-25.3.1fixed 4.12.14-25.3.1

    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 imag

  • CVE-2018-1093Apr 2, 2018
    affected < 4.12.14-25.3.1fixed 4.12.14-25.3.1

    The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.

  • CVE-2018-1092Apr 2, 2018
    affected < 4.12.14-25.3.1fixed 4.12.14-25.3.1

    The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 imag

  • CVE-2017-18224Mar 12, 2018
    affected < 4.12.14-25.25.1fixed 4.12.14-25.25.1

    In the Linux kernel before 4.15, fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field.

  • CVE-2018-7492Feb 26, 2018
    affected < 4.12.14-25.3.1fixed 4.12.14-25.3.1

    A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.

  • CVE-2017-5753Jan 4, 2018
    affected < 4.12.14-25.3.1fixed 4.12.14-25.3.1

    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2017-5715Jan 4, 2018
    affected < 4.12.14-25.3.1fixed 4.12.14-25.3.1

    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2017-16533MedNov 4, 2017
    affected < 4.12.14-25.25.1fixed 4.12.14-25.25.1

    The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.

  • CVE-2017-13695MedAug 25, 2017
    affected < 4.12.14-150000.150.92.2fixed 4.12.14-150000.150.92.2

    The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanis

Page 31 of 31