VYPR

rpm package

suse/kernel-source&distro=SUSE Linux Enterprise Server 12 SP3

pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3

Vulnerabilities (174)

  • CVE-2018-1000004Jan 16, 2018
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.

  • CVE-2018-5333Jan 11, 2018
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.

  • CVE-2018-5332Jan 11, 2018
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).

  • CVE-2017-15129Jan 9, 2018
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead

  • CVE-2017-5754Jan 4, 2018
    affected < 4.4.103-6.38.1fixed 4.4.103-6.38.1

    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

  • CVE-2017-5753Jan 4, 2018
    affected < 4.4.103-6.38.1fixed 4.4.103-6.38.1

    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2017-5715Jan 4, 2018
    affected < 4.4.103-6.38.1fixed 4.4.103-6.38.1

    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2017-18017Jan 3, 2018
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presenc

  • CVE-2017-17975MedDec 30, 2017
    affected < 4.4.120-94.17.1fixed 4.4.120-94.17.1

    Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c in the Linux kernel through 4.14.10 allows attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfr

  • CVE-2017-17864LowDec 27, 2017
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

  • CVE-2017-17862MedDec 27, 2017
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.

  • CVE-2017-17806HigDec 20, 2017
    affected < 4.4.103-6.38.1fixed 4.4.103-6.38.1

    The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorith

  • CVE-2017-17805HigDec 20, 2017
    affected < 4.4.103-6.38.1fixed 4.4.103-6.38.1

    The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and

  • CVE-2017-17741MedDec 18, 2017
    affected < 4.4.138-94.39.1fixed 4.4.138-94.39.1

    The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.

  • CVE-2017-17712HigDec 16, 2017
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.

  • CVE-2017-1000410HigDec 7, 2017
    affected < 4.4.103-6.33.1fixed 4.4.103-6.33.1

    The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. This info leak is a result of uninitialized stack variables that may be returned to an attacker in their unini

  • CVE-2017-17450HigDec 7, 2017
    affected < 4.4.103-6.33.1fixed 4.4.103-6.33.1

    net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all

  • CVE-2017-17449MedDec 7, 2017
    affected < 4.4.103-6.33.1fixed 4.4.103-6.33.1

    The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveragin

  • CVE-2017-17448HigDec 7, 2017
    affected < 4.4.103-6.33.1fixed 4.4.103-6.33.1

    net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all

  • CVE-2017-13166HigDec 6, 2017
    affected < 4.4.120-94.17.1fixed 4.4.120-94.17.1

    An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.

Page 7 of 9