- Home
- CVEs with nessus.description==The+SUSE+Linux+Enterprise+12+SP1+LTSS+kernel+was+updated+to+receive+various+security+and+bugfixes.+The+following+security+bugs+were+fixed+%3A%0A%0A++-+CVE-2018-1087%3A+And+an+unprivileged+KVM+guest+user+could+++++use+this+flaw+to+potentially+escalate+their+privileges+++++inside+a+guest.+%28bsc%231087088%29%0A%0A++-+CVE-2018-8897%3A+An+unprivileged+system+user+could+use+++++incorrect+set+up+interrupt+stacks+to+crash+the+Linux+++++kernel+resulting+in+DoS+issue.+%28bsc%231087088%29%0A%0A++-+CVE-2018-8781%3A+The+udl_fb_mmap+function+in+++++drivers%2Fgpu%2Fdrm%2Fudl%2Fudl_fb.c+had+an+integer-overflow+++++vulnerability+allowing+local+users+with+access+to+the+++++udldrmfb+driver+to+obtain+full+read+and+write+++++permissions+on+kernel+physical+pages%2C+resulting+in+a+++++code+execution+in+kernel+space+%28bnc%231090643%29.%0A%0A++-+CVE-2018-10124%3A+The+kill_something_info+function+in+++++kernel%2Fsignal.c+might+allow+local+users+to+cause+a+++++denial+of+service+via+an+INT_MIN+argument+%28bnc%231089752%29.%0A%0A++-+CVE-2018-10087%3A+The+kernel_wait4+function+in+++++kernel%2Fexit.c+in+might+allow+local+users+to+cause+a+++++denial+of+service+by+triggering+an+attempted+use+of+the%0A++++-INT_MIN+value+%28bnc%231089608%29.%0A%0A++-+CVE-2018-7757%3A+Memory+leak+in+the+sas_smp_get_phy_events+++++function+in+drivers%2Fscsi%2Flibsas%2Fsas_expander.c+allowed+++++local+users+to+cause+a+denial+of+service+%28memory+++++consumption%29+via+many+read+accesses+to+files+in+the+++++%2Fsys%2Fclass%2Fsas_phy+directory%2C+as+demonstrated+by+the+++++%2Fsys%2Fclass%2Fsas_phy%2Fphy-1%3A0%3A12%2Finvalid_dword_count+file+++++%28bnc%231084536%29.%0A%0A++-+CVE-2017-13220%3A+An+elevation+of+privilege+vulnerability+++++in+the+Upstream+kernel+bluez+was+fixed.+%28bnc%231076537%29.%0A%0A++-+CVE-2017-11089%3A+A+buffer+overread+is+observed+in+++++nl80211_set_station+when+user+space+application+sends+++++attribute+NL80211_ATTR_LOCAL_MESH_POWER_MODE+with+data+++++of+size+less+than+4+bytes+%28bnc%231088261%29.%0A%0A++-+CVE-2017-0861%3A+Use-after-free+vulnerability+in+the+++++snd_pcm_info+function+in+the+ALSA+subsystem+allowed+++++attackers+to+gain+privileges+via+unspecified+vectors+++++%28bnc%231088260%29.%0A%0A++-+CVE-2018-8822%3A+Incorrect+buffer+length+handling+in+the+++++ncp_read_kernel+function+in+fs%2Fncpfs%2Fncplib_kernel.c+++++could+be+exploited+by+malicious+NCPFS+servers+to+crash+++++the+kernel+or+execute+code+%28bnc%231086162%29.%0A%0A++-+CVE-2017-18203%3A+The+dm_get_from_kobject+function+in+++++drivers%2Fmd%2Fdm.c+allowed+local+users+to+cause+a+denial+of+++++service+%28BUG%29+by+leveraging+a+race+condition+with%0A++++__dm_destroy+during+creation+and+removal+of+DM+devices+++++%28bnc%231083242%29.%0A%0AThe+update+package+also+includes+non-security+fixes.+See+advisory+for+details.%0A%0ANote+that+Tenable+Network+Security+has+extracted+the+preceding+description+block+directly+from+the+SUSE+security+advisory.+Tenable+has+attempted+to+automatically+clean+and+format+it+as+much+as+possible+without+introducing+additional+issues
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top