VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP3

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3

Vulnerabilities (513)

  • CVE-2018-9363Nov 6, 2018
    affected < 4.4.155-94.50.1fixed 4.4.155-94.50.1

    In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 Refer

  • CVE-2018-18281Oct 30, 2018
    affected < 4.4.162-94.69.2fixed 4.4.162-94.69.2

    Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits a

  • CVE-2018-18710Oct 27, 2018
    affected < 4.4.162-94.69.2fixed 4.4.162-94.69.2

    An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CV

  • CVE-2018-18690Oct 26, 2018
    affected < 4.4.162-94.69.2fixed 4.4.162-94.69.2

    In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/li

  • CVE-2018-18386Oct 17, 2018
    affected < 4.4.162-94.69.2fixed 4.4.162-94.69.2

    drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.

  • CVE-2018-17972Oct 3, 2018
    affected < 4.4.180-94.97.1fixed 4.4.180-94.97.1

    An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack

  • CVE-2018-14633Sep 25, 2018
    affected < 4.4.162-94.69.2fixed 4.4.162-94.69.2

    A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes

  • CVE-2018-16597Sep 21, 2018
    affected < 4.4.156-94.57.1fixed 4.4.156-94.57.1

    An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem.

  • CVE-2018-17182Sep 19, 2018
    affected < 4.4.156-94.57.1fixed 4.4.156-94.57.1

    An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and de

  • CVE-2018-10853Sep 11, 2018
    affected < 4.4.178-94.91.2fixed 4.4.178-94.91.2

    A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potential

  • CVE-2018-16658Sep 7, 2018
    affected < 4.4.155-94.50.1fixed 4.4.155-94.50.1

    An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to

  • CVE-2018-5391Sep 6, 2018
    affected < 4.4.175-94.79.1fixed 4.4.175-94.79.1

    The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in I

  • CVE-2018-6555Sep 4, 2018
    affected < 4.4.155-94.50.1fixed 4.4.155-94.50.1

    The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA

  • CVE-2018-6554Sep 4, 2018
    affected < 4.4.155-94.50.1fixed 4.4.155-94.50.1

    Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.

  • CVE-2018-16276Aug 31, 2018
    affected < 4.4.156-94.57.1fixed 4.4.156-94.57.1

    An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.

  • CVE-2018-10938Aug 27, 2018
    affected < 4.4.155-94.50.1fixed 4.4.155-94.50.1

    A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A cer

  • CVE-2018-10902Aug 21, 2018
    affected < 4.4.155-94.50.1fixed 4.4.155-94.50.1

    It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local a

  • CVE-2018-15594Aug 20, 2018
    affected < 4.4.178-94.91.2fixed 4.4.178-94.91.2

    arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.

  • CVE-2018-15572Aug 20, 2018
    affected < 4.4.155-94.50.1fixed 4.4.155-94.50.1

    The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.

  • CVE-2018-3646Aug 14, 2018
    affected < 4.4.143-94.47.1fixed 4.4.143-94.47.1

    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis

Page 20 of 26