rpm package
suse/kernel-syms&distro=SUSE OpenStack Cloud 6
pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%206
Vulnerabilities (100)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-16911 | — | < 3.12.74-60.64.85.1 | 3.12.74-60.64.85.1 | Jan 31, 2018 | The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP. | ||
| CVE-2017-18079 | — | < 3.12.74-60.64.82.1 | 3.12.74-60.64.82.1 | Jan 29, 2018 | drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port->exists value can change after it is validated. | ||
| CVE-2015-1142857 | — | < 3.12.74-60.64.82.1 | 3.12.74-60.64.82.1 | Jan 23, 2018 | On multiple SR-IOV cars it is possible for VF's assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4 | ||
| CVE-2018-1000004 | — | < 3.12.74-60.64.82.1 | 3.12.74-60.64.82.1 | Jan 16, 2018 | In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition. | ||
| CVE-2017-13220 | — | < 3.12.74-60.64.88.1 | 3.12.74-60.64.88.1 | Jan 12, 2018 | An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053. | ||
| CVE-2017-13215 | — | < 3.12.74-60.64.82.1 | 3.12.74-60.64.82.1 | Jan 12, 2018 | A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel. | ||
| CVE-2018-5333 | — | < 3.12.74-60.64.85.1 | 3.12.74-60.64.85.1 | Jan 11, 2018 | In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference. | ||
| CVE-2018-5332 | — | < 3.12.74-60.64.85.1 | 3.12.74-60.64.85.1 | Jan 11, 2018 | In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c). | ||
| CVE-2017-5754 | — | < 3.12.74-60.64.69.1 | 3.12.74-60.64.69.1 | Jan 4, 2018 | Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache. | ||
| CVE-2017-5753 | — | < 3.12.74-60.64.69.1 | 3.12.74-60.64.69.1 | Jan 4, 2018 | Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | ||
| CVE-2017-5715 | — | < 3.12.74-60.64.69.1 | 3.12.74-60.64.69.1 | Jan 4, 2018 | Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | ||
| CVE-2017-18017 | — | < 3.12.74-60.64.85.1 | 3.12.74-60.64.85.1 | Jan 3, 2018 | The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presenc | ||
| CVE-2017-17806 | Hig | 7.8 | < 3.12.74-60.64.82.1 | 3.12.74-60.64.82.1 | Dec 20, 2017 | The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorith | |
| CVE-2017-17805 | Hig | 7.8 | < 3.12.74-60.64.82.1 | 3.12.74-60.64.82.1 | Dec 20, 2017 | The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and | |
| CVE-2017-17741 | Med | 6.5 | < 3.12.74-60.64.82.1 | 3.12.74-60.64.82.1 | Dec 18, 2017 | The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h. | |
| CVE-2017-17558 | Med | 6.6 | < 3.12.74-60.64.69.1 | 3.12.74-60.64.69.1 | Dec 12, 2017 | The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denia | |
| CVE-2017-17450 | Hig | 7.8 | < 3.12.74-60.64.69.1 | 3.12.74-60.64.69.1 | Dec 7, 2017 | net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all | |
| CVE-2017-17449 | Med | 4.7 | < 3.12.74-60.64.69.1 | 3.12.74-60.64.69.1 | Dec 7, 2017 | The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveragin | |
| CVE-2017-17448 | Hig | 7.8 | < 3.12.74-60.64.69.1 | 3.12.74-60.64.69.1 | Dec 7, 2017 | net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all | |
| CVE-2017-13167 | Hig | 7.8 | < 3.12.74-60.64.69.1 | 3.12.74-60.64.69.1 | Dec 6, 2017 | An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993. |
- CVE-2017-16911Jan 31, 2018affected < 3.12.74-60.64.85.1fixed 3.12.74-60.64.85.1
The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.
- CVE-2017-18079Jan 29, 2018affected < 3.12.74-60.64.82.1fixed 3.12.74-60.64.82.1
drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port->exists value can change after it is validated.
- CVE-2015-1142857Jan 23, 2018affected < 3.12.74-60.64.82.1fixed 3.12.74-60.64.82.1
On multiple SR-IOV cars it is possible for VF's assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4
- CVE-2018-1000004Jan 16, 2018affected < 3.12.74-60.64.82.1fixed 3.12.74-60.64.82.1
In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.
- CVE-2017-13220Jan 12, 2018affected < 3.12.74-60.64.88.1fixed 3.12.74-60.64.88.1
An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.
- CVE-2017-13215Jan 12, 2018affected < 3.12.74-60.64.82.1fixed 3.12.74-60.64.82.1
A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.
- CVE-2018-5333Jan 11, 2018affected < 3.12.74-60.64.85.1fixed 3.12.74-60.64.85.1
In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.
- CVE-2018-5332Jan 11, 2018affected < 3.12.74-60.64.85.1fixed 3.12.74-60.64.85.1
In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).
- CVE-2017-5754Jan 4, 2018affected < 3.12.74-60.64.69.1fixed 3.12.74-60.64.69.1
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
- CVE-2017-5753Jan 4, 2018affected < 3.12.74-60.64.69.1fixed 3.12.74-60.64.69.1
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
- CVE-2017-5715Jan 4, 2018affected < 3.12.74-60.64.69.1fixed 3.12.74-60.64.69.1
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
- CVE-2017-18017Jan 3, 2018affected < 3.12.74-60.64.85.1fixed 3.12.74-60.64.85.1
The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presenc
- affected < 3.12.74-60.64.82.1fixed 3.12.74-60.64.82.1
The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorith
- affected < 3.12.74-60.64.82.1fixed 3.12.74-60.64.82.1
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and
- affected < 3.12.74-60.64.82.1fixed 3.12.74-60.64.82.1
The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
- affected < 3.12.74-60.64.69.1fixed 3.12.74-60.64.69.1
The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denia
- affected < 3.12.74-60.64.69.1fixed 3.12.74-60.64.69.1
net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all
- affected < 3.12.74-60.64.69.1fixed 3.12.74-60.64.69.1
The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveragin
- affected < 3.12.74-60.64.69.1fixed 3.12.74-60.64.69.1
net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all
- affected < 3.12.74-60.64.69.1fixed 3.12.74-60.64.69.1
An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993.
Page 2 of 5