VYPR

rpm package

suse/kgraft-patch-SLE12-SP2_Update_23&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP2

pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_23&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2

Vulnerabilities (31)

  • CVE-2018-5803Jun 12, 2018
    affected < 1-3.5.1fixed 1-3.5.1

    In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.

  • CVE-2018-1000199May 24, 2018
    affected < 1-3.5.1fixed 1-3.5.1

    The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears

  • CVE-2018-1130May 10, 2018
    affected < 1-3.5.1fixed 1-3.5.1

    Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.

  • CVE-2017-13305Apr 4, 2018
    affected < 1-3.5.1fixed 1-3.5.1

    A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.

  • CVE-2018-1094Apr 2, 2018
    affected < 1-3.5.1fixed 1-3.5.1

    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 imag

  • CVE-2018-1093Apr 2, 2018
    affected < 1-3.5.1fixed 1-3.5.1

    The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.

  • CVE-2018-1092Apr 2, 2018
    affected < 1-3.5.1fixed 1-3.5.1

    The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 imag

  • CVE-2017-18249Mar 26, 2018
    affected < 1-3.5.1fixed 1-3.5.1

    The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.

  • CVE-2017-18241Mar 21, 2018
    affected < 1-3.5.1fixed 1-3.5.1

    fs/f2fs/segment.c in the Linux kernel before 4.13 allows local users to cause a denial of service (NULL pointer dereference and panic) by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure.

  • CVE-2018-1065Mar 2, 2018
    affected < 1-3.5.1fixed 1-3.5.1

    The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capab

  • CVE-2018-7492Feb 26, 2018
    affected < 1-3.5.1fixed 1-3.5.1

    A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.

Page 2 of 2