VYPR

rpm package

suse/kernel-syms-rt&distro=SUSE Linux Enterprise Real Time 12 SP3

pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP3

Vulnerabilities (99)

  • CVE-2018-1000026Feb 9, 2018
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An atta

  • CVE-2017-16913Jan 31, 2018
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP pack

  • CVE-2017-16912Jan 31, 2018
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    The "get_pipe()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.

  • CVE-2018-1000004Jan 16, 2018
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.

  • CVE-2018-5333Jan 11, 2018
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.

  • CVE-2018-5332Jan 11, 2018
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).

  • CVE-2017-15129Jan 9, 2018
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead

  • CVE-2017-5753Jan 4, 2018
    affected < 4.4.139-3.17.1fixed 4.4.139-3.17.1

    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2017-5715Jan 4, 2018
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2017-18017Jan 3, 2018
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presenc

  • CVE-2017-17975MedDec 30, 2017
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c in the Linux kernel through 4.14.10 allows attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfr

  • CVE-2017-17864LowDec 27, 2017
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

  • CVE-2017-17862MedDec 27, 2017
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.

  • CVE-2017-17741MedDec 18, 2017
    affected < 4.4.138-3.14.1fixed 4.4.138-3.14.1

    The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.

  • CVE-2017-17712HigDec 16, 2017
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.

  • CVE-2017-13166HigDec 6, 2017
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.

  • CVE-2017-16939HigNov 24, 2017
    affected < 4.4.170-3.32.1fixed 4.4.170-3.32.1

    The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink message

  • CVE-2017-16644MedNov 7, 2017
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.

  • CVE-2017-15951HigOct 28, 2017
    affected < 4.4.120-3.8.1fixed 4.4.120-3.8.1

    The KEYS subsystem in the Linux kernel before 4.13.10 does not correctly synchronize the actions of updating versus finding a key in the "negative" state to avoid a race condition, which allows local users to cause a denial of service or possibly have unspecified other impact via

Page 5 of 5