VYPR

rpm package

suse/kernel-ec2&distro=SUSE Linux Enterprise Module for Public Cloud 12

pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012

Vulnerabilities (409)

  • CVE-2018-20836May 7, 2019
    affected < 3.12.74-60.64.118.1fixed 3.12.74-60.64.118.1

    An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.

  • CVE-2019-11810May 7, 2019
    affected < 3.12.74-60.64.121.1fixed 3.12.74-60.64.121.1

    An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.

  • CVE-2019-3882Apr 24, 2019
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a syste

  • CVE-2019-11487Apr 23, 2019
    affected < 3.12.74-60.64.118.1fixed 3.12.74-60.64.118.1

    The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm

  • CVE-2019-11486Apr 23, 2019
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.

  • CVE-2019-11190Apr 11, 2019
    affected < 3.12.74-60.64.115.1fixed 3.12.74-60.64.115.1

    The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.

  • CVE-2019-3460Apr 11, 2019
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.

  • CVE-2019-3459Apr 11, 2019
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.

  • CVE-2018-19985Mar 17, 2019
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address

  • CVE-2019-7222Mar 17, 2019
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.

  • CVE-2019-7221Mar 17, 2019
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.

  • CVE-2019-9213Mar 5, 2019
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.

  • CVE-2019-6974Feb 15, 2019
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.

  • CVE-2016-10741Feb 1, 2019
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.

  • CVE-2019-5489Jan 7, 2019
    affected < 3.12.74-60.64.115.1fixed 3.12.74-60.64.115.1

    The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincor

  • CVE-2018-16884Dec 18, 2018
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel m

  • CVE-2018-20169Dec 17, 2018
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.

  • CVE-2018-9568Dec 6, 2018
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. A

  • CVE-2018-19824Dec 3, 2018
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.

  • CVE-2018-19407Nov 21, 2018
    affected < 3.12.74-60.64.110.1fixed 3.12.74-60.64.110.1

    The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.

Page 4 of 21