rpm package
suse/kernel-source&distro=SUSE Linux Enterprise Server 12 SP3
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3
Vulnerabilities (174)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-11833 | — | < 4.4.180-94.97.1 | 4.4.180-94.97.1 | May 15, 2019 | fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem. | ||
| CVE-2019-11884 | — | < 4.4.180-94.97.1 | 4.4.180-94.97.1 | May 10, 2019 | The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character. | ||
| CVE-2019-11815 | — | < 4.4.180-94.97.1 | 4.4.180-94.97.1 | May 8, 2019 | An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup. | ||
| CVE-2018-20836 | — | < 4.4.180-94.100.1 | 4.4.180-94.100.1 | May 7, 2019 | An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. | ||
| CVE-2019-11599 | — | < 4.4.180-94.100.1 | 4.4.180-94.100.1 | Apr 29, 2019 | The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other | ||
| CVE-2019-3882 | — | < 4.4.178-94.91.1 | 4.4.178-94.91.1 | Apr 24, 2019 | A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a syste | ||
| CVE-2019-11487 | — | < 4.4.180-94.100.1 | 4.4.180-94.100.1 | Apr 23, 2019 | The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm | ||
| CVE-2019-11486 | — | < 4.4.180-94.97.1 | 4.4.180-94.97.1 | Apr 23, 2019 | The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions. | ||
| CVE-2019-11190 | — | < 4.4.180-94.97.1 | 4.4.180-94.97.1 | Apr 11, 2019 | The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. | ||
| CVE-2019-3460 | — | < 4.4.175-94.79.1 | 4.4.175-94.79.1 | Apr 11, 2019 | A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1. | ||
| CVE-2019-3459 | — | < 4.4.175-94.79.1 | 4.4.175-94.79.1 | Apr 11, 2019 | A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1. | ||
| CVE-2018-19985 | — | < 4.4.175-94.79.1 | 4.4.175-94.79.1 | Mar 17, 2019 | The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address | ||
| CVE-2019-7222 | — | < 4.4.175-94.79.1 | 4.4.175-94.79.1 | Mar 17, 2019 | The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak. | ||
| CVE-2019-7221 | — | < 4.4.175-94.79.1 | 4.4.175-94.79.1 | Mar 17, 2019 | The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free. | ||
| CVE-2019-9213 | — | < 4.4.176-94.88.1 | 4.4.176-94.88.1 | Mar 5, 2019 | In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task. | ||
| CVE-2019-6974 | — | < 4.4.175-94.79.1 | 4.4.175-94.79.1 | Feb 15, 2019 | In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free. | ||
| CVE-2019-5489 | — | < 4.4.180-94.97.1 | 4.4.180-94.97.1 | Jan 7, 2019 | The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincor | ||
| CVE-2018-16884 | — | < 4.4.175-94.79.1 | 4.4.175-94.79.1 | Dec 18, 2018 | A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel m | ||
| CVE-2018-20169 | — | < 4.4.175-94.79.1 | 4.4.175-94.79.1 | Dec 17, 2018 | An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c. | ||
| CVE-2018-9568 | — | < 4.4.175-94.79.1 | 4.4.175-94.79.1 | Dec 6, 2018 | In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. A |
- CVE-2019-11833May 15, 2019affected < 4.4.180-94.97.1fixed 4.4.180-94.97.1
fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.
- CVE-2019-11884May 10, 2019affected < 4.4.180-94.97.1fixed 4.4.180-94.97.1
The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
- CVE-2019-11815May 8, 2019affected < 4.4.180-94.97.1fixed 4.4.180-94.97.1
An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.
- CVE-2018-20836May 7, 2019affected < 4.4.180-94.100.1fixed 4.4.180-94.100.1
An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
- CVE-2019-11599Apr 29, 2019affected < 4.4.180-94.100.1fixed 4.4.180-94.100.1
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other
- CVE-2019-3882Apr 24, 2019affected < 4.4.178-94.91.1fixed 4.4.178-94.91.1
A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a syste
- CVE-2019-11487Apr 23, 2019affected < 4.4.180-94.100.1fixed 4.4.180-94.100.1
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm
- CVE-2019-11486Apr 23, 2019affected < 4.4.180-94.97.1fixed 4.4.180-94.97.1
The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
- CVE-2019-11190Apr 11, 2019affected < 4.4.180-94.97.1fixed 4.4.180-94.97.1
The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.
- CVE-2019-3460Apr 11, 2019affected < 4.4.175-94.79.1fixed 4.4.175-94.79.1
A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.
- CVE-2019-3459Apr 11, 2019affected < 4.4.175-94.79.1fixed 4.4.175-94.79.1
A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.
- CVE-2018-19985Mar 17, 2019affected < 4.4.175-94.79.1fixed 4.4.175-94.79.1
The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address
- CVE-2019-7222Mar 17, 2019affected < 4.4.175-94.79.1fixed 4.4.175-94.79.1
The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.
- CVE-2019-7221Mar 17, 2019affected < 4.4.175-94.79.1fixed 4.4.175-94.79.1
The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.
- CVE-2019-9213Mar 5, 2019affected < 4.4.176-94.88.1fixed 4.4.176-94.88.1
In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.
- CVE-2019-6974Feb 15, 2019affected < 4.4.175-94.79.1fixed 4.4.175-94.79.1
In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.
- CVE-2019-5489Jan 7, 2019affected < 4.4.180-94.97.1fixed 4.4.180-94.97.1
The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincor
- CVE-2018-16884Dec 18, 2018affected < 4.4.175-94.79.1fixed 4.4.175-94.79.1
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel m
- CVE-2018-20169Dec 17, 2018affected < 4.4.175-94.79.1fixed 4.4.175-94.79.1
An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.
- CVE-2018-9568Dec 6, 2018affected < 4.4.175-94.79.1fixed 4.4.175-94.79.1
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. A
Page 2 of 9