VYPR

rpm package

suse/kernel-syms&distro=SUSE Linux Enterprise Desktop 12 SP3

pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3

Vulnerabilities (163)

  • CVE-2018-7740Mar 7, 2018
    affected < 4.4.126-94.22.1fixed 4.4.126-94.22.1

    The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.

  • CVE-2018-1065Mar 2, 2018
    affected < 4.4.131-94.29.1fixed 4.4.131-94.29.1

    The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capab

  • CVE-2017-18208Mar 1, 2018
    affected < 4.4.120-94.17.1fixed 4.4.120-94.17.1

    The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.

  • CVE-2018-7492Feb 26, 2018
    affected < 4.4.131-94.29.1fixed 4.4.131-94.29.1

    A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.

  • CVE-2018-7480Feb 25, 2018
    affected < 4.4.156-94.57.1fixed 4.4.156-94.57.1

    The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure.

  • CVE-2017-18174Feb 11, 2018
    affected < 4.4.120-94.17.1fixed 4.4.120-94.17.1

    In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.

  • CVE-2018-1000026Feb 9, 2018
    affected < 4.4.120-94.17.1fixed 4.4.120-94.17.1

    Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An atta

  • CVE-2017-16913Jan 31, 2018
    affected < 4.4.120-94.17.1fixed 4.4.120-94.17.1

    The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP pack

  • CVE-2017-16912Jan 31, 2018
    affected < 4.4.120-94.17.1fixed 4.4.120-94.17.1

    The "get_pipe()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.

  • CVE-2018-1000004Jan 16, 2018
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.

  • CVE-2018-5333Jan 11, 2018
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.

  • CVE-2018-5332Jan 11, 2018
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).

  • CVE-2017-15129Jan 9, 2018
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead

  • CVE-2017-5754Jan 4, 2018
    affected < 4.4.103-6.38.1fixed 4.4.103-6.38.1

    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

  • CVE-2017-5753Jan 4, 2018
    affected < 4.4.103-6.38.1fixed 4.4.103-6.38.1

    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2017-5715Jan 4, 2018
    affected < 4.4.103-6.38.1fixed 4.4.103-6.38.1

    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2017-18017Jan 3, 2018
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presenc

  • CVE-2017-17975MedDec 30, 2017
    affected < 4.4.120-94.17.1fixed 4.4.120-94.17.1

    Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c in the Linux kernel through 4.14.10 allows attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfr

  • CVE-2017-17864LowDec 27, 2017
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

  • CVE-2017-17862MedDec 27, 2017
    affected < 4.4.114-94.11.2fixed 4.4.114-94.11.2

    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.

Page 6 of 9