rpm package
suse/kernel-syms&distro=SUSE OpenStack Cloud 6
pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%206
Vulnerabilities (100)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-16529 | Med | 6.6 | < 3.12.74-60.64.66.1 | 3.12.74-60.64.66.1 | Nov 4, 2017 | The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. | |
| CVE-2017-16527 | Med | 6.6 | < 3.12.74-60.64.66.1 | 3.12.74-60.64.66.1 | Nov 4, 2017 | sound/usb/mixer.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. | |
| CVE-2017-16525 | Med | 6.6 | < 3.12.74-60.64.66.1 | 3.12.74-60.64.66.1 | Nov 4, 2017 | The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnect | |
| CVE-2017-15649 | Hig | 7.8 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Oct 19, 2017 | net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, | |
| CVE-2017-13080 | Med | 5.3 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Oct 17, 2017 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients. | |
| CVE-2017-15265 | Hig | 7.0 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Oct 16, 2017 | Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq | |
| CVE-2017-15299 | Med | 5.5 | < 3.12.74-60.64.85.1 | 3.12.74-60.64.85.1 | Oct 14, 2017 | The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of add_key for a key that already exists but is uninstantiated, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a c | |
| CVE-2017-15274 | Med | 5.5 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Oct 12, 2017 | security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, | |
| CVE-2017-1000112 | Hig | 7.0 | < 3.12.74-60.64.54.1 | 3.12.74-60.64.54.1 | Oct 5, 2017 | Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which lea | |
| CVE-2017-1000111 | Hig | 7.8 | < 3.12.74-60.64.54.1 | 3.12.74-60.64.54.1 | Oct 5, 2017 | Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET | |
| CVE-2017-12154 | Hig | 7.1 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Sep 26, 2017 | The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obt | |
| CVE-2017-12153 | Med | 4.4 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Sep 21, 2017 | A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_N | |
| CVE-2017-1000251 | Hig | 8.0 | < 3.12.74-60.64.60.1 | 3.12.74-60.64.60.1 | Sep 12, 2017 | The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel spa | |
| CVE-2017-14140 | Med | 5.5 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Sep 5, 2017 | The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR. | |
| CVE-2017-14106 | Med | 5.5 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Sep 1, 2017 | The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. | |
| CVE-2017-14051 | Med | 4.4 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Aug 31, 2017 | An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access. | |
| CVE-2017-10661 | Hig | 7.0 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Aug 19, 2017 | Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing. | |
| CVE-2017-12762 | Cri | 9.8 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Aug 9, 2017 | In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stable tree, and 4.4-stable tree. | |
| CVE-2017-7533 | Hig | 7.0 | < 3.12.74-60.64.51.1 | 3.12.74-60.64.51.1 | Aug 5, 2017 | Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename funct | |
| CVE-2017-7541 | Hig | 7.8 | < 3.12.74-60.64.63.1 | 3.12.74-60.64.63.1 | Jul 25, 2017 | The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netl |
- affected < 3.12.74-60.64.66.1fixed 3.12.74-60.64.66.1
The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
- affected < 3.12.74-60.64.66.1fixed 3.12.74-60.64.66.1
sound/usb/mixer.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device.
- affected < 3.12.74-60.64.66.1fixed 3.12.74-60.64.66.1
The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnect
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free,
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq
- affected < 3.12.74-60.64.85.1fixed 3.12.74-60.64.85.1
The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of add_key for a key that already exists but is uninstantiated, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a c
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call,
- affected < 3.12.74-60.64.54.1fixed 3.12.74-60.64.54.1
Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which lea
- affected < 3.12.74-60.64.54.1fixed 3.12.74-60.64.54.1
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obt
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_N
- affected < 3.12.74-60.64.60.1fixed 3.12.74-60.64.60.1
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel spa
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stable tree, and 4.4-stable tree.
- affected < 3.12.74-60.64.51.1fixed 3.12.74-60.64.51.1
Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename funct
- affected < 3.12.74-60.64.63.1fixed 3.12.74-60.64.63.1
The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netl
Page 4 of 5