ALT-BU-2019-3494-1
Branch p8 update bulletin.
Closed bugs
sssd не перезапускается при обновлении (до sssd-1.15.3-alt1.M80P.1)
logrotate из коробки не хочет ротировать sssd логи
Package kernel-image-un-def updated to version 4.19.16-alt0.M80P.1 for branch p8 in task 219847.
Closed vulnerabilities
BDU:2018-00713
Уязвимость функции ext4_xattr_check_entries ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00714
Уязвимость функции ext4_fill_super ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00715
Уязвимость функции ext4_valid_block_bitmap ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00716
Уязвимость функции ext4_iget ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00979
Уязвимость функций tcp_collapse_ofo_queue и tcp_prune_ofo_queue операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-01436
Уязвимость ядра операционной системы Linux, связанная с ошибками обработки фрагментированных IP-пакетов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00067
Уязвимость функции mincore () ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-00517
Уязвимость функции alarm_timer_nsleep (kernel/time/alarmtimer.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00570
Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-00978
Уязвимость в файле drivers/infiniband/core/ucma.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01052
Уязвимость функции vcpu_scan_ioapic ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01056
Уязвимость функции ext4_init_block_bitmap() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01057
Уязвимость функции ext4_xattr_set_entry() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01058
Уязвимость функции ext4_update_inline_data() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01062
Уязвимость функции crypto_report_one() ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-01343
Уязвимость функции cdrom_ioctl_drive_status() операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-01345
Уязвимость функции xfs_attr_shortform_addname реализации файловой системы XFS операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01409
Уязвимость функции hso_get_config_data ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02163
Уязвимость функции show_opcodes ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-02380
Уязвимость функции __usb_get_extra_descriptor подсистемы USB ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2019-02508
Уязвимость функции irda_setsockopt ядра операционной системы Linux, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-02512
Уязвимость функции hfsplus_lookup () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02783
Уязвимость в реализации системного вызова mremap() ядра операционной системы Linux, позволяющая нарушителю получить доступ к физической странице
BDU:2019-03067
Уязвимость функции ipddp_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03298
Уязвимость функции usb_audio_probe ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03459
Уязвимость функции fd_locked_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03624
Уязвимость функции __blk_drain_queue() в файле block/blk-core.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-04744
Уязвимость драйверов drivers/bluetooth/hci_ath.c, drivers/bluetooth/hci_bcm.c, drivers/bluetooth/hci_intel.c, drivers/bluetooth/hci_ldisc.c, drivers/bluetooth/hci_mrvl.c, drivers/bluetooth/hci_qca.c, drivers/bluetooth/hci_uart.h для UART-подключаемых адаптеров Bluetooth ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00620
Уязвимость компонента userfaultfd ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2020-00735
Уязвимость функции xenvif_set_hash_mapping гипервизора Xen, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-00842
Уязвимость в функции can_can_gw_rcv in net/can/gw.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02916
Уязвимость компонента fs/xfs/xfs_super.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-02917
Уязвимость функции rsi_mac80211_detach ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03257
Уязвимость функции fscrypt_do_page_crypto() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03258
Уязвимость функции remove_dirty_segment() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03259
Уязвимость функции o_ctl_map_page() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03260
Уязвимость функции btrfs_root_node() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03261
Уязвимость функции try_merge_free_space() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03262
Уязвимость функции write_extent_buffer() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03263
Уязвимость функции secs_per_zone ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03265
Уязвимость функции incorrect user_block_count ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03305
Уязвимость функции mmap()ing ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01415
Уязвимость драйвера drivers/staging/irda/net/af_irda.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01416
Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) в файле arch/arm64/kvm/guest.c ядра операционной системы Linux, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2021-01417
Уязвимость в файле arch/x86/kernel/paravirt.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01418
Уязвимость функции spectre_v2_select_mitigation ядра операционной системы Linux, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01420
Уязвимость функции vhost_new_msg() ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01436
Уязвимость компонента time/posix-timers.c ядра операционной системы Linux, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01437
Уязвимость функции cdrom_ioctl_select_disc (drivers/cdrom/cdrom.c) ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01834
Уязвимость функции n_tty_receive_char_special ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04134
Уязвимость функции show_floppy (drivers/block/floppy.c) ядра операционной системы Linux, позволяющая нарушителю обойти защиту ядра и получить несанкционированный доступ к защищаемой информации
BDU:2022-00150
Уязвимость подсистемы BPF ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-03968
Уязвимость компонента fs/xfs/libxfs/xfs_inode_buf.c файловой системы XFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-10723
An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the page allocator (e.g., via concurrent page fault events) when the global OOM killer is invoked. NOTE: the software maintainer has not accepted certain proposed patches, in part because of a viewpoint that "the underlying problem is non-trivial to handle.
Modified: 2024-11-21
CVE-2017-1000407
The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
- [oss-security] 20171204 CVE-2017-1000407 Kernel: KVM: DoS via write flood to I/O port 0x80
- [oss-security] 20171204 CVE-2017-1000407 Kernel: KVM: DoS via write flood to I/O port 0x80
- 102038
- 102038
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2019:1170
- RHSA-2019:1170
- https://access.redhat.com/security/cve/cve-2017-1000407
- https://access.redhat.com/security/cve/cve-2017-1000407
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- USN-3583-1
- USN-3583-1
- USN-3583-2
- USN-3583-2
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3632-1
- USN-3632-1
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
- [kvm] 20171201 [PATCH 1/2] KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
- [kvm] 20171201 [PATCH 1/2] KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
Modified: 2024-11-21
CVE-2017-1000410
The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. This info leak is a result of uninitialized stack variables that may be returned to an attacker in their uninitialized state. By manipulating the code flows that precede the handling of these configuration messages, an attacker can also gain some control over which data will be held in the uninitialized stack variables. This can allow him to bypass KASLR, and stack canaries protection - as both pointers and stack canaries may be leaked in this manner. Combining this vulnerability (for example) with the previously disclosed RCE vulnerability in L2CAP configuration parsing (CVE-2017-1000251) may allow an attacker to exploit the RCE against kernels which were built with the above mitigations. These are the specifics of this vulnerability: In the function l2cap_parse_conf_rsp and in the function l2cap_parse_conf_req the following variable is declared without initialization: struct l2cap_conf_efs efs; In addition, when parsing input configuration parameters in both of these functions, the switch case for handling EFS elements may skip the memcpy call that will write to the efs variable: ... case L2CAP_CONF_EFS: if (olen == sizeof(efs)) memcpy(&efs, (void *)val, olen); ... The olen in the above if is attacker controlled, and regardless of that if, in both of these functions the efs variable would eventually be added to the outgoing configuration request that is being built: l2cap_add_conf_opt(&ptr, L2CAP_CONF_EFS, sizeof(efs), (unsigned long) &efs); So by sending a configuration request, or response, that contains an L2CAP_CONF_EFS element, but with an element length that is not sizeof(efs) - the memcpy to the uninitialized efs variable can be avoided, and the uninitialized variable would be returned to the attacker (16 bytes).
- [oss-security] 20171206 Info Leak in the Linux Kernel via Bluetooth
- [oss-security] 20171206 Info Leak in the Linux Kernel via Bluetooth
- 102101
- 102101
- RHSA-2018:0654
- RHSA-2018:0654
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2018:1130
- RHSA-2018:1130
- RHSA-2018:1170
- RHSA-2018:1170
- RHSA-2018:1319
- RHSA-2018:1319
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- USN-3933-1
- USN-3933-1
- USN-3933-2
- USN-3933-2
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
Modified: 2024-11-21
CVE-2017-18216
In fs/ocfs2/cluster/nodemanager.c in the Linux kernel before 4.15, local users can cause a denial of service (NULL pointer dereference and BUG) because a required mutex is not used.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=853bc26a7ea39e354b9f8889ae7ad1492ffa28d2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=853bc26a7ea39e354b9f8889ae7ad1492ffa28d2
- 103278
- 103278
- https://github.com/torvalds/linux/commit/853bc26a7ea39e354b9f8889ae7ad1492ffa28d2
- https://github.com/torvalds/linux/commit/853bc26a7ea39e354b9f8889ae7ad1492ffa28d2
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3798-1
- USN-3798-1
- USN-3798-2
- USN-3798-2
- DSA-4187
- DSA-4187
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2017-18224
In the Linux kernel before 4.15, fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3e4c56d41eef5595035872a2ec5a483f42e8917f
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3e4c56d41eef5595035872a2ec5a483f42e8917f
- 103353
- 103353
- https://github.com/torvalds/linux/commit/3e4c56d41eef5595035872a2ec5a483f42e8917f
- https://github.com/torvalds/linux/commit/3e4c56d41eef5595035872a2ec5a483f42e8917f
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2017-18232
The Serial Attached SCSI (SAS) implementation in the Linux kernel through 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0558f33c06bb910e2879e355192227a8e8f0219d
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0558f33c06bb910e2879e355192227a8e8f0219d
- 103423
- 103423
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://github.com/torvalds/linux/commit/0558f33c06bb910e2879e355192227a8e8f0219d
- https://github.com/torvalds/linux/commit/0558f33c06bb910e2879e355192227a8e8f0219d
- USN-4163-1
- USN-4163-1
- USN-4163-2
- USN-4163-2
- DSA-4187
- DSA-4187
Modified: 2024-11-21
CVE-2018-1000204
Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit.
- openSUSE-SU-2019:1407
- openSUSE-SU-2019:1407
- http://www.openwall.com/lists/oss-security/2018/06/26/3
- http://www.openwall.com/lists/oss-security/2018/06/26/3
- RHSA-2018:2948
- RHSA-2018:2948
- https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824
- https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3696-1
- USN-3696-1
- USN-3696-2
- USN-3696-2
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2018-10021
drivers/scsi/libsas/sas_scsi_host.c in the Linux kernel before 4.16 allows local users to cause a denial of service (ata qc leak) by triggering certain failure conditions. NOTE: a third party disputes the relevance of this report because the failure can only occur for physically proximate attackers who unplug SAS Host Bus Adapter cables
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39
- https://bugzilla.suse.com/show_bug.cgi?id=1089281
- https://bugzilla.suse.com/show_bug.cgi?id=1089281
- https://github.com/torvalds/linux/commit/318aaf34f1179b39fa9c30fa0f3288b645beee39
- https://github.com/torvalds/linux/commit/318aaf34f1179b39fa9c30fa0f3288b645beee39
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3678-1
- USN-3678-1
- USN-3678-2
- USN-3678-2
- USN-3678-3
- USN-3678-3
- USN-3678-4
- USN-3678-4
- USN-3696-1
- USN-3696-1
- USN-3696-2
- USN-3696-2
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2018-10074
The hi3660_stub_clk_probe function in drivers/clk/hisilicon/clk-hi3660-stub.c in the Linux kernel before 4.16 allows local users to cause a denial of service (NULL pointer dereference) by triggering a failure of resource retrieval.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9903e41ae1f5d50c93f268ca3304d4d7c64b9311
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9903e41ae1f5d50c93f268ca3304d4d7c64b9311
- https://github.com/torvalds/linux/commit/9903e41ae1f5d50c93f268ca3304d4d7c64b9311
- https://github.com/torvalds/linux/commit/9903e41ae1f5d50c93f268ca3304d4d7c64b9311
Modified: 2024-11-21
CVE-2018-10322
The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.
- 103960
- 103960
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=199377
- https://bugzilla.kernel.org/show_bug.cgi?id=199377
- USN-4578-1
- USN-4578-1
- USN-4579-1
- USN-4579-1
- https://www.spinics.net/lists/linux-xfs/msg17215.html
- https://www.spinics.net/lists/linux-xfs/msg17215.html
Modified: 2024-11-21
CVE-2018-10323
The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.
- 103959
- 103959
- https://bugzilla.kernel.org/show_bug.cgi?id=199423
- https://bugzilla.kernel.org/show_bug.cgi?id=199423
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
- USN-3754-1
- USN-3754-1
- USN-4486-1
- USN-4486-1
- DSA-4188
- DSA-4188
- https://www.spinics.net/lists/linux-xfs/msg17254.html
- https://www.spinics.net/lists/linux-xfs/msg17254.html
Modified: 2024-11-21
CVE-2018-1065
The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
- http://lists.openwall.net/netdev/2018/01/27/46
- http://lists.openwall.net/netdev/2018/01/27/46
- http://patchwork.ozlabs.org/patch/870355/
- http://patchwork.ozlabs.org/patch/870355/
- 1040446
- 1040446
- RHSA-2018:2948
- RHSA-2018:2948
- https://bugzilla.redhat.com/show_bug.cgi?id=1547824
- https://bugzilla.redhat.com/show_bug.cgi?id=1547824
- https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
- https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
- USN-3654-1
- USN-3654-1
- USN-3654-2
- USN-3654-2
- USN-3656-1
- USN-3656-1
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2018-10853
A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.
- openSUSE-SU-2019:1407
- openSUSE-SU-2019:1407
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- RHSA-2020:0036
- RHSA-2020:0036
- RHSA-2020:0103
- RHSA-2020:0103
- RHSA-2020:0179
- RHSA-2020:0179
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10853
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10853
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c9fa24ca7c9c47605672916491f79e8ccacb9e6
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c9fa24ca7c9c47605672916491f79e8ccacb9e6
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- https://www.openwall.com/lists/oss-security/2018/09/02/1
- https://www.openwall.com/lists/oss-security/2018/09/02/1
Modified: 2024-11-21
CVE-2018-10878
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.
- http://patchwork.ozlabs.org/patch/929237/
- http://patchwork.ozlabs.org/patch/929237/
- http://patchwork.ozlabs.org/patch/929238/
- http://patchwork.ozlabs.org/patch/929238/
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=199865
- https://bugzilla.kernel.org/show_bug.cgi?id=199865
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10878
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10878
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77260807d1170a8cf35dbb06e07461a655f67eee
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77260807d1170a8cf35dbb06e07461a655f67eee
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=819b23f1c501b17b9694325471789e6b5cc2d0d2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=819b23f1c501b17b9694325471789e6b5cc2d0d2
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3753-1
- USN-3753-1
- USN-3753-2
- USN-3753-2
- USN-3871-1
- USN-3871-1
- USN-3871-3
- USN-3871-3
- USN-3871-4
- USN-3871-4
- USN-3871-5
- USN-3871-5
Modified: 2024-11-21
CVE-2018-10879
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.
- http://patchwork.ozlabs.org/patch/928666/
- http://patchwork.ozlabs.org/patch/928666/
- http://patchwork.ozlabs.org/patch/928667/
- http://patchwork.ozlabs.org/patch/928667/
- 104902
- 104902
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=200001
- https://bugzilla.kernel.org/show_bug.cgi?id=200001
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3753-1
- USN-3753-1
- USN-3753-2
- USN-3753-2
- USN-3871-1
- USN-3871-1
- USN-3871-3
- USN-3871-3
- USN-3871-4
- USN-3871-4
- USN-3871-5
- USN-3871-5
Modified: 2024-11-21
CVE-2018-10880
Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.
- http://patchwork.ozlabs.org/patch/930639/
- http://patchwork.ozlabs.org/patch/930639/
- 104907
- 104907
- 106503
- 106503
- RHSA-2018:2948
- RHSA-2018:2948
- https://bugzilla.kernel.org/show_bug.cgi?id=200005
- https://bugzilla.kernel.org/show_bug.cgi?id=200005
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10880
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10880
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3821-1
- USN-3821-1
- USN-3821-2
- USN-3821-2
- USN-3871-1
- USN-3871-1
- USN-3871-3
- USN-3871-3
- USN-3871-4
- USN-3871-4
- USN-3871-5
- USN-3871-5
Modified: 2024-11-21
CVE-2018-10881
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.
- http://patchwork.ozlabs.org/patch/929792/
- http://patchwork.ozlabs.org/patch/929792/
- 104901
- 104901
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=200015
- https://bugzilla.kernel.org/show_bug.cgi?id=200015
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10881
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10881
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e8ab72a812396996035a37e5ca4b3b99b5d214b
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e8ab72a812396996035a37e5ca4b3b99b5d214b
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
- USN-3753-1
- USN-3753-1
- USN-3753-2
- USN-3753-2
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2018-1092
The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.
- http://openwall.com/lists/oss-security/2018/03/29/1
- http://openwall.com/lists/oss-security/2018/03/29/1
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=199179
- https://bugzilla.kernel.org/show_bug.cgi?id=199179
- https://bugzilla.kernel.org/show_bug.cgi?id=199275
- https://bugzilla.kernel.org/show_bug.cgi?id=199275
- https://bugzilla.redhat.com/show_bug.cgi?id=1560777
- https://bugzilla.redhat.com/show_bug.cgi?id=1560777
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- USN-3676-1
- USN-3676-1
- USN-3676-2
- USN-3676-2
- USN-3677-1
- USN-3677-1
- USN-3677-2
- USN-3677-2
- USN-3678-1
- USN-3678-1
- USN-3678-2
- USN-3678-2
- USN-3678-3
- USN-3678-3
- USN-3678-4
- USN-3678-4
- USN-3754-1
- USN-3754-1
- DSA-4187
- DSA-4187
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2018-1093
The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.
- http://openwall.com/lists/oss-security/2018/03/29/1
- http://openwall.com/lists/oss-security/2018/03/29/1
- https://bugzilla.kernel.org/show_bug.cgi?id=199181
- https://bugzilla.kernel.org/show_bug.cgi?id=199181
- https://bugzilla.redhat.com/show_bug.cgi?id=1560782
- https://bugzilla.redhat.com/show_bug.cgi?id=1560782
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=7dac4a1726a9c64a517d595c40e95e2d0d135f6f
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=7dac4a1726a9c64a517d595c40e95e2d0d135f6f
- [debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update
- [debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- USN-3676-1
- USN-3676-1
- USN-3676-2
- USN-3676-2
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
- USN-3754-1
- USN-3754-1
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2018-1094
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.
- http://openwall.com/lists/oss-security/2018/03/29/1
- http://openwall.com/lists/oss-security/2018/03/29/1
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=199183
- https://bugzilla.kernel.org/show_bug.cgi?id=199183
- https://bugzilla.redhat.com/show_bug.cgi?id=1560788
- https://bugzilla.redhat.com/show_bug.cgi?id=1560788
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=18db4b4e6fc31eda838dd1c1296d67dbcb3dc957
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=18db4b4e6fc31eda838dd1c1296d67dbcb3dc957
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=a45403b51582a87872927a3e0fc0a389c26867f1
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=a45403b51582a87872927a3e0fc0a389c26867f1
- USN-3695-1
- USN-3695-1
- USN-3695-2
- USN-3695-2
Modified: 2024-11-21
CVE-2018-10940
The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
- 104154
- 104154
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
- https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
- [debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update
- [debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3676-1
- USN-3676-1
- USN-3676-2
- USN-3676-2
- USN-3695-1
- USN-3695-1
- USN-3695-2
- USN-3695-2
- USN-3754-1
- USN-3754-1
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.6
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.6
Modified: 2024-11-21
CVE-2018-1095
The ext4_xattr_check_entries function in fs/ext4/xattr.c in the Linux kernel through 4.15.15 does not properly validate xattr sizes, which causes misinterpretation of a size as an error code, and consequently allows attackers to cause a denial of service (get_acl NULL pointer dereference and system crash) via a crafted ext4 image.
- http://openwall.com/lists/oss-security/2018/03/29/1
- http://openwall.com/lists/oss-security/2018/03/29/1
- RHSA-2018:2948
- RHSA-2018:2948
- https://bugzilla.kernel.org/show_bug.cgi?id=199185
- https://bugzilla.kernel.org/show_bug.cgi?id=199185
- https://bugzilla.redhat.com/show_bug.cgi?id=1560793
- https://bugzilla.redhat.com/show_bug.cgi?id=1560793
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=ce3fd194fcc6fbdc00ce095a852f22df97baa401
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=ce3fd194fcc6fbdc00ce095a852f22df97baa401
- USN-3695-1
- USN-3695-1
- USN-3695-2
- USN-3695-2
Modified: 2024-11-21
CVE-2018-1108
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
- 104055
- 104055
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
- USN-3718-1
- USN-3718-1
- USN-3718-2
- USN-3718-2
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2018-1118
Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3762-1
- USN-3762-1
- USN-3762-2
- USN-3762-2
Modified: 2024-11-21
CVE-2018-1120
A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/
- [oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report
- [oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report
- 104229
- 104229
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1120
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1120
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f7ccc2ccc2e70c6054685f5e3522efa81556830
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f7ccc2ccc2e70c6054685f5e3522efa81556830
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- GLSA-201805-14
- GLSA-201805-14
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
- USN-3910-1
- USN-3910-1
- USN-3910-2
- USN-3910-2
- 44806
- 44806
Modified: 2024-11-21
CVE-2018-1130
Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
- RHSA-2018:1854
- RHSA-2018:1854
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2
- [debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update
- [debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [linux-netdev] 20180306 [PATCH net] dccp: check sk for closed state in dccp_sendmsg()
- [linux-netdev] 20180306 [PATCH net] dccp: check sk for closed state in dccp_sendmsg()
- https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94
- https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94
- USN-3654-1
- USN-3654-1
- USN-3654-2
- USN-3654-2
- USN-3656-1
- USN-3656-1
- USN-3697-1
- USN-3697-1
- USN-3697-2
- USN-3697-2
- USN-3698-1
- USN-3698-1
- USN-3698-2
- USN-3698-2
Modified: 2024-11-21
CVE-2018-11412
In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in fs/ext4/inline.c performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode.
- 104291
- 104291
- RHSA-2019:0525
- RHSA-2019:0525
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1580
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1580
- https://bugzilla.kernel.org/show_bug.cgi?id=199803
- https://bugzilla.kernel.org/show_bug.cgi?id=199803
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
- 44832
- 44832
Modified: 2024-11-21
CVE-2018-11508
The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a0b98734479aa5b3c671d5190e86273372cab95
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a0b98734479aa5b3c671d5190e86273372cab95
- 104292
- 104292
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1574
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1574
- https://github.com/torvalds/linux/commit/0a0b98734479aa5b3c671d5190e86273372cab95
- https://github.com/torvalds/linux/commit/0a0b98734479aa5b3c671d5190e86273372cab95
- USN-3695-1
- USN-3695-1
- USN-3695-2
- USN-3695-2
- USN-3697-1
- USN-3697-1
- USN-3697-2
- USN-3697-2
- 46208
- 46208
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.9
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.9
Modified: 2024-11-21
CVE-2018-12232
In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6d8c50dcb029872b298eea68cc6209c866fd3e14
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6d8c50dcb029872b298eea68cc6209c866fd3e14
- 104453
- 104453
- RHSA-2018:2948
- RHSA-2018:2948
- https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14
- https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14
- https://lkml.org/lkml/2018/6/5/14
- https://lkml.org/lkml/2018/6/5/14
- https://patchwork.ozlabs.org/patch/926519/
- https://patchwork.ozlabs.org/patch/926519/
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
Modified: 2024-11-21
CVE-2018-12233
In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.
- 104452
- 104452
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- https://lkml.org/lkml/2018/6/2/2
- https://lkml.org/lkml/2018/6/2/2
- https://marc.info/?l=linux-kernel&m=152814391530549&w=2
- https://marc.info/?l=linux-kernel&m=152814391530549&w=2
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
- USN-3753-1
- USN-3753-1
- USN-3753-2
- USN-3753-2
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2018-12633
An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious user thread can tamper with the critical variables (hdr.size_in and hdr.size_out) in the header between the two fetches because of a race condition, leading to severe kernel errors, such as buffer over-accesses. This bug can cause a local denial of service and information leakage.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bd23a7269834dc7c1f93e83535d16ebc44b75eba
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bd23a7269834dc7c1f93e83535d16ebc44b75eba
- https://bugzilla.kernel.org/show_bug.cgi?id=200131
- https://bugzilla.kernel.org/show_bug.cgi?id=200131
- https://github.com/torvalds/linux/commit/bd23a7269834dc7c1f93e83535d16ebc44b75eba
- https://github.com/torvalds/linux/commit/bd23a7269834dc7c1f93e83535d16ebc44b75eba
Modified: 2024-11-21
CVE-2018-12896
An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.
- https://bugzilla.kernel.org/show_bug.cgi?id=200189
- https://bugzilla.kernel.org/show_bug.cgi?id=200189
- https://github.com/lcytxw/bug_repro/tree/master/bug_200189
- https://github.com/lcytxw/bug_repro/tree/master/bug_200189
- https://github.com/torvalds/linux/commit/78c9c4dfbf8c04883941445a195276bb4bb92c76
- https://github.com/torvalds/linux/commit/78c9c4dfbf8c04883941445a195276bb4bb92c76
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- USN-3847-1
- USN-3847-1
- USN-3847-2
- USN-3847-2
- USN-3847-3
- USN-3847-3
- USN-3848-1
- USN-3848-1
- USN-3848-2
- USN-3848-2
- USN-3849-1
- USN-3849-1
- USN-3849-2
- USN-3849-2
Modified: 2024-11-21
CVE-2018-12904
In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=727ba748e110b4de50d142edca9d6a9b7e6111d8
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=727ba748e110b4de50d142edca9d6a9b7e6111d8
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1589
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1589
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.2
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.2
- https://github.com/torvalds/linux/commit/727ba748e110b4de50d142edca9d6a9b7e6111d8
- https://github.com/torvalds/linux/commit/727ba748e110b4de50d142edca9d6a9b7e6111d8
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
- 44944
- 44944
Modified: 2024-11-21
CVE-2018-13053
The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.
- 104671
- 104671
- RHSA-2019:0831
- RHSA-2019:0831
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- https://bugzilla.kernel.org/show_bug.cgi?id=200303
- https://bugzilla.kernel.org/show_bug.cgi?id=200303
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=5f936e19cc0ef97dbe3a56e9498922ad5ba1edef
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=5f936e19cc0ef97dbe3a56e9498922ad5ba1edef
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- USN-3821-1
- USN-3821-1
- USN-3821-2
- USN-3821-2
- USN-4094-1
- USN-4094-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-13093
An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- https://bugzilla.kernel.org/show_bug.cgi?id=199367
- https://bugzilla.kernel.org/show_bug.cgi?id=199367
- https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&id=afca6c5b2595fc44383919fba740c194b0b76aff
- https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&id=afca6c5b2595fc44383919fba740c194b0b76aff
- https://github.com/torvalds/linux/commit/afca6c5b2595fc44383919fba740c194b0b76aff
- https://github.com/torvalds/linux/commit/afca6c5b2595fc44383919fba740c194b0b76aff
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- USN-4094-1
- USN-4094-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-13094
An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp.
- RHSA-2019:0831
- RHSA-2019:0831
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- https://bugzilla.kernel.org/show_bug.cgi?id=199969
- https://bugzilla.kernel.org/show_bug.cgi?id=199969
- https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&id=bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a
- https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&id=bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a
- https://github.com/torvalds/linux/commit/bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a
- https://github.com/torvalds/linux/commit/bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
- USN-3753-1
- USN-3753-1
- USN-3753-2
- USN-3753-2
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2018-13095
An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.
- RHSA-2019:1350
- RHSA-2019:1350
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- https://bugzilla.kernel.org/show_bug.cgi?id=199915
- https://bugzilla.kernel.org/show_bug.cgi?id=199915
- https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&id=23fcb3340d033d9f081e21e6c12c2db7eaa541d3
- https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&id=23fcb3340d033d9f081e21e6c12c2db7eaa541d3
- https://github.com/torvalds/linux/commit/23fcb3340d033d9f081e21e6c12c2db7eaa541d3
- https://github.com/torvalds/linux/commit/23fcb3340d033d9f081e21e6c12c2db7eaa541d3
Modified: 2024-11-21
CVE-2018-13097
An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.17.3. There is an out-of-bounds read or a divide-by-zero error for an incorrect user_block_count in a corrupted f2fs image, leading to a denial of service (BUG).
- openSUSE-SU-2018:3202
- openSUSE-SU-2018:3202
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://bugzilla.kernel.org/show_bug.cgi?id=200171
- https://bugzilla.kernel.org/show_bug.cgi?id=200171
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9dc956b2c8523aed39d1e6508438be9fea28c8fc
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9dc956b2c8523aed39d1e6508438be9fea28c8fc
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- 20190130 [slackware-security] Slackware 14.2 kernel (SSA:2019-030-01)
- 20190130 [slackware-security] Slackware 14.2 kernel (SSA:2019-030-01)
- USN-3932-1
- USN-3932-1
- USN-3932-2
- USN-3932-2
- USN-4094-1
- USN-4094-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-13098
An issue was discovered in fs/f2fs/inode.c in the Linux kernel through 4.17.3. A denial of service (slab out-of-bounds read and BUG) can occur for a modified f2fs filesystem image in which FI_EXTRA_ATTR is set in an inode.
- openSUSE-SU-2018:3202
- openSUSE-SU-2018:3202
- https://bugzilla.kernel.org/show_bug.cgi?id=200173
- https://bugzilla.kernel.org/show_bug.cgi?id=200173
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76d56d4ab4f2a9e4f085c7d77172194ddaccf7d2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76d56d4ab4f2a9e4f085c7d77172194ddaccf7d2
- USN-4094-1
- USN-4094-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-13100
An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.17.3, which does not properly validate secs_per_zone in a corrupted f2fs image, as demonstrated by a divide-by-zero error.
- openSUSE-SU-2018:3202
- openSUSE-SU-2018:3202
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- 104679
- 104679
- https://bugzilla.kernel.org/show_bug.cgi?id=200183
- https://bugzilla.kernel.org/show_bug.cgi?id=200183
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42bf546c1fe3f3654bdf914e977acbc2b80a5be5
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42bf546c1fe3f3654bdf914e977acbc2b80a5be5
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- 20190130 [slackware-security] Slackware 14.2 kernel (SSA:2019-030-01)
- 20190130 [slackware-security] Slackware 14.2 kernel (SSA:2019-030-01)
- USN-3932-1
- USN-3932-1
- USN-3932-2
- USN-3932-2
- USN-4094-1
- USN-4094-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-14609
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199833
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://patchwork.kernel.org/patch/10500521/
- USN-3821-1
- USN-3821-2
- USN-4094-1
- USN-4118-1
- DSA-4308
- 104917
- DSA-4308
- USN-4118-1
- USN-4094-1
- USN-3821-2
- USN-3821-1
- https://patchwork.kernel.org/patch/10500521/
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=199833
Modified: 2024-11-21
CVE-2018-14610
An issue was discovered in the Linux kernel through 4.17.10. There is out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image, because of a lack of verification that each block group has a corresponding chunk at mount time, within btrfs_read_block_groups in fs/btrfs/extent-tree.c.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199837
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://patchwork.kernel.org/patch/10503415/
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- 104917
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- https://patchwork.kernel.org/patch/10503415/
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=199837
Modified: 2024-11-21
CVE-2018-14611
An issue was discovered in the Linux kernel through 4.17.10. There is a use-after-free in try_merge_free_space() when mounting a crafted btrfs image, because of a lack of chunk type flag checks in btrfs_check_chunk_valid in fs/btrfs/volumes.c.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199839
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://patchwork.kernel.org/patch/10503099/
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- 104917
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- https://patchwork.kernel.org/patch/10503099/
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=199839
Modified: 2024-11-21
CVE-2018-14612
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in btrfs_root_node() when mounting a crafted btrfs image, because of a lack of chunk block group mapping validation in btrfs_read_block_groups in fs/btrfs/extent-tree.c, and a lack of empty-tree checks in check_leaf in fs/btrfs/tree-checker.c.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199847
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://patchwork.kernel.org/patch/10503403/
- https://patchwork.kernel.org/patch/10503413/
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- 104917
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- https://patchwork.kernel.org/patch/10503413/
- https://patchwork.kernel.org/patch/10503403/
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=199847
Modified: 2024-11-21
CVE-2018-14613
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199849
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://patchwork.kernel.org/patch/10503147/
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- 104917
- https://www.oracle.com/security-alerts/cpuApr2021.html
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- https://patchwork.kernel.org/patch/10503147/
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=199849
Modified: 2024-11-21
CVE-2018-14614
An issue was discovered in the Linux kernel through 4.17.10. There is an out-of-bounds access in __remove_dirty_segment() in fs/f2fs/segment.c when mounting an f2fs image.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200419
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- 104917
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=200419
Modified: 2024-11-21
CVE-2018-14615
An issue was discovered in the Linux kernel through 4.17.10. There is a buffer overflow in truncate_inline_inode() in fs/f2fs/inline.c when umounting an f2fs image, because a length value may be negative.
Modified: 2024-11-21
CVE-2018-14616
An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference in fscrypt_do_page_crypto() in fs/crypto/crypto.c when operating on a file in a corrupted f2fs image.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200465
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- 104917
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=200465
Modified: 2024-11-21
CVE-2018-14617
An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200297
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3821-1
- USN-3821-2
- USN-4094-1
- USN-4118-1
- DSA-4308
- https://www.spinics.net/lists/linux-fsdevel/msg130021.html
- 104917
- https://www.spinics.net/lists/linux-fsdevel/msg130021.html
- DSA-4308
- USN-4118-1
- USN-4094-1
- USN-3821-2
- USN-3821-1
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=200297
Modified: 2024-11-21
CVE-2018-14656
A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.
- 1041804
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1650
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14656
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342db04ae71273322f0011384a9ed414df8bdae4
- https://lore.kernel.org/lkml/20180828154901.112726-1-jannh%40google.com/T/
- https://seclists.org/oss-sec/2018/q4/9
- 1041804
- https://seclists.org/oss-sec/2018/q4/9
- https://lore.kernel.org/lkml/20180828154901.112726-1-jannh%40google.com/T/
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342db04ae71273322f0011384a9ed414df8bdae4
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14656
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1650
Modified: 2024-11-21
CVE-2018-14734
drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- RHSA-2019:0831
- RHSA-2019:2029
- RHSA-2019:2043
- https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3797-1
- USN-3797-2
- USN-3847-1
- USN-3847-2
- USN-3847-3
- USN-3849-1
- USN-3849-2
- DSA-4308
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- DSA-4308
- USN-3849-2
- USN-3849-1
- USN-3847-3
- USN-3847-2
- USN-3847-1
- USN-3797-2
- USN-3797-1
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- RHSA-2019:2043
- RHSA-2019:2029
- RHSA-2019:0831
Modified: 2024-11-21
CVE-2018-15471
An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.
- http://xenbits.xen.org/xsa/advisory-270.html
- http://xenbits.xen.org/xsa/advisory-270.html
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1607
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1607
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- USN-3819-1
- USN-3819-1
- USN-3820-1
- USN-3820-1
- USN-3820-2
- USN-3820-2
- USN-3820-3
- USN-3820-3
- DSA-4313
- DSA-4313
Modified: 2024-11-21
CVE-2018-15572
The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdf82a7856b32d905c39afc85e34364491e46346
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdf82a7856b32d905c39afc85e34364491e46346
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.1
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.1
- https://github.com/torvalds/linux/commit/fdf82a7856b32d905c39afc85e34364491e46346
- https://github.com/torvalds/linux/commit/fdf82a7856b32d905c39afc85e34364491e46346
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3775-1
- USN-3775-1
- USN-3775-2
- USN-3775-2
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- USN-3777-3
- USN-3777-3
- DSA-4308
- DSA-4308
Modified: 2024-11-21
CVE-2018-15594
arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5800dc5c19f34e6e03b5adab1282535cb102fafd
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5800dc5c19f34e6e03b5adab1282535cb102fafd
- openSUSE-SU-2019:1407
- openSUSE-SU-2019:1407
- 105120
- 105120
- 1041601
- 1041601
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.1
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.1
- https://github.com/torvalds/linux/commit/5800dc5c19f34e6e03b5adab1282535cb102fafd
- https://github.com/torvalds/linux/commit/5800dc5c19f34e6e03b5adab1282535cb102fafd
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://twitter.com/grsecurity/status/1029324426142199808
- https://twitter.com/grsecurity/status/1029324426142199808
- USN-3775-1
- USN-3775-1
- USN-3775-2
- USN-3775-2
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- USN-3777-3
- USN-3777-3
- DSA-4308
- DSA-4308
Modified: 2024-11-21
CVE-2018-16658
An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
- 105334
- 105334
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- RHSA-2019:4154
- RHSA-2019:4154
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.6
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.6
- https://github.com/torvalds/linux/commit/8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
- https://github.com/torvalds/linux/commit/8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3797-1
- USN-3797-1
- USN-3797-2
- USN-3797-2
- USN-3820-1
- USN-3820-1
- USN-3820-2
- USN-3820-2
- USN-3820-3
- USN-3820-3
- USN-3822-1
- USN-3822-1
- USN-3822-2
- USN-3822-2
- DSA-4308
- DSA-4308
Modified: 2024-11-21
CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
- openSUSE-SU-2019:1407
- openSUSE-SU-2019:1407
- 105525
- 105525
- RHSA-2019:0512
- RHSA-2019:0512
- RHSA-2019:0514
- RHSA-2019:0514
- RHSA-2019:0831
- RHSA-2019:0831
- RHSA-2019:2473
- RHSA-2019:2473
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- https://marc.info/?l=linux-fsdevel&m=153806242024956&w=2
- https://marc.info/?l=linux-fsdevel&m=153806242024956&w=2
- https://support.f5.com/csp/article/K27673650?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K27673650?utm_source=f5support&%3Butm_medium=RSS
- USN-3821-1
- USN-3821-1
- USN-3821-2
- USN-3821-2
- USN-3832-1
- USN-3832-1
- USN-3835-1
- USN-3835-1
- USN-3871-1
- USN-3871-1
- USN-3871-3
- USN-3871-3
- USN-3871-4
- USN-3871-4
- USN-3871-5
- USN-3871-5
- USN-3880-1
- USN-3880-1
- USN-3880-2
- USN-3880-2
Modified: 2024-11-21
CVE-2018-18021
arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a denial of service (hypervisor panic) via an illegal exception return. This occurs because of insufficient restrictions on userspace access to the core register file, and because PSTATE.M validation does not prevent unintended execution modes.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f93459d689d990b3ecfbe782fec89b97d3279
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f93459d689d990b3ecfbe782fec89b97d3279
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d26c25a9d19b5976b319af528886f89cf455692d
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d26c25a9d19b5976b319af528886f89cf455692d
- 105550
- 105550
- RHSA-2018:3656
- RHSA-2018:3656
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.12
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.12
- https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279
- https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279
- https://github.com/torvalds/linux/commit/d26c25a9d19b5976b319af528886f89cf455692d
- https://github.com/torvalds/linux/commit/d26c25a9d19b5976b319af528886f89cf455692d
- USN-3821-1
- USN-3821-1
- USN-3821-2
- USN-3821-2
- USN-3931-1
- USN-3931-1
- USN-3931-2
- USN-3931-2
- DSA-4313
- DSA-4313
- https://www.openwall.com/lists/oss-security/2018/10/02/2
- https://www.openwall.com/lists/oss-security/2018/10/02/2
Modified: 2024-11-21
CVE-2018-18281
Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.
- http://packetstormsecurity.com/files/150001/Linux-mremap-TLB-Flush-Too-Late.html
- http://packetstormsecurity.com/files/150001/Linux-mremap-TLB-Flush-Too-Late.html
- [oss-security] 20181029 Linux kernel: TLB flush happens too late on mremap (CVE-2018-18281; fixed in 4.9.135, 4.14.78, 4.18.16, 4.19)
- [oss-security] 20181029 Linux kernel: TLB flush happens too late on mremap (CVE-2018-18281; fixed in 4.9.135, 4.14.78, 4.18.16, 4.19)
- 105761
- 105761
- 106503
- 106503
- RHSA-2019:0831
- RHSA-2019:0831
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- RHSA-2020:0036
- RHSA-2020:0036
- RHSA-2020:0100
- RHSA-2020:0100
- RHSA-2020:0103
- RHSA-2020:0103
- RHSA-2020:0179
- RHSA-2020:0179
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1695
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1695
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.78
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.78
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.16
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.16
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.135
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.135
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eb66ae030829605d61fbef1909ce310e29f78821
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eb66ae030829605d61fbef1909ce310e29f78821
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- USN-3832-1
- USN-3832-1
- USN-3835-1
- USN-3835-1
- USN-3871-1
- USN-3871-1
- USN-3871-3
- USN-3871-3
- USN-3871-4
- USN-3871-4
- USN-3871-5
- USN-3871-5
- USN-3880-1
- USN-3880-1
- USN-3880-2
- USN-3880-2
Modified: 2024-11-21
CVE-2018-18397
The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0163
- RHSA-2019:0163
- RHSA-2019:0202
- RHSA-2019:0202
- RHSA-2019:0324
- RHSA-2019:0324
- RHSA-2019:0831
- RHSA-2019:0831
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1700
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1700
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7
- https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1
- https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1
- USN-3901-1
- USN-3901-1
- USN-3901-2
- USN-3901-2
- USN-3903-1
- USN-3903-1
- USN-3903-2
- USN-3903-2
Modified: 2024-11-21
CVE-2018-18690
In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7b38460dc8e4eafba06c78f8e37099d3b34d473c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7b38460dc8e4eafba06c78f8e37099d3b34d473c
- 105753
- 105753
- https://bugzilla.kernel.org/show_bug.cgi?id=199119
- https://bugzilla.kernel.org/show_bug.cgi?id=199119
- https://bugzilla.suse.com/show_bug.cgi?id=1105025
- https://bugzilla.suse.com/show_bug.cgi?id=1105025
- https://github.com/torvalds/linux/commit/7b38460dc8e4eafba06c78f8e37099d3b34d473c
- https://github.com/torvalds/linux/commit/7b38460dc8e4eafba06c78f8e37099d3b34d473c
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- USN-3847-1
- USN-3847-1
- USN-3847-2
- USN-3847-2
- USN-3847-3
- USN-3847-3
- USN-3848-1
- USN-3848-1
- USN-3848-2
- USN-3848-2
- USN-3849-1
- USN-3849-1
- USN-3849-2
- USN-3849-2
Modified: 2024-11-21
CVE-2018-18710
An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
- 106041
- 106041
- https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
- https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- USN-3846-1
- USN-3846-1
- USN-3847-1
- USN-3847-1
- USN-3847-2
- USN-3847-2
- USN-3847-3
- USN-3847-3
- USN-3848-1
- USN-3848-1
- USN-3848-2
- USN-3848-2
- USN-3849-1
- USN-3849-1
- USN-3849-2
- USN-3849-2
Modified: 2024-11-21
CVE-2018-19406
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
Modified: 2024-11-21
CVE-2018-19407
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
- 105987
- 105987
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://lkml.org/lkml/2018/11/20/580
- https://lkml.org/lkml/2018/11/20/580
- USN-3871-1
- USN-3871-1
- USN-3871-3
- USN-3871-3
- USN-3871-4
- USN-3871-4
- USN-3871-5
- USN-3871-5
- USN-3872-1
- USN-3872-1
- USN-3878-1
- USN-3878-1
- USN-3878-2
- USN-3878-2
- USN-3879-1
- USN-3879-1
- USN-3879-2
- USN-3879-2
Modified: 2024-11-21
CVE-2018-19824
In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.
- 106109
- 106109
- RHSA-2019:2703
- RHSA-2019:2703
- https://bugzilla.suse.com/show_bug.cgi?id=1118152
- https://bugzilla.suse.com/show_bug.cgi?id=1118152
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=5f8cf712582617d523120df67d392059eaf2fc4b
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=5f8cf712582617d523120df67d392059eaf2fc4b
- https://github.com/torvalds/linux/commit/5f8cf712582617d523120df67d392059eaf2fc4b
- https://github.com/torvalds/linux/commit/5f8cf712582617d523120df67d392059eaf2fc4b
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://support.f5.com/csp/article/K98155950
- https://support.f5.com/csp/article/K98155950
- USN-3879-1
- USN-3879-1
- USN-3879-2
- USN-3879-2
- USN-3930-1
- USN-3930-1
- USN-3930-2
- USN-3930-2
- USN-3931-1
- USN-3931-1
- USN-3931-2
- USN-3931-2
- USN-3933-1
- USN-3933-1
- USN-3933-2
- USN-3933-2
Modified: 2024-11-21
CVE-2018-19854
An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option).
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43f39958beb206b53292801e216d9b8a660f087
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43f39958beb206b53292801e216d9b8a660f087
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087
- https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087
- https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.3
- https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.3
- USN-3872-1
- USN-3872-1
- USN-3878-1
- USN-3878-1
- USN-3878-2
- USN-3878-2
- USN-3901-1
- USN-3901-1
- USN-3901-2
- USN-3901-2
Modified: 2024-11-21
CVE-2018-19985
The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
- http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- https://hexhive.epfl.ch/projects/perifuzz/
- https://hexhive.epfl.ch/projects/perifuzz/
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://seclists.org/bugtraq/2019/Jan/52
- https://seclists.org/bugtraq/2019/Jan/52
- https://security.netapp.com/advisory/ntap-20190404-0002/
- https://security.netapp.com/advisory/ntap-20190404-0002/
- USN-4115-1
- USN-4115-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-20169
An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=704620afc70cf47abb9d6a1a57f3825d2bca49cf
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=704620afc70cf47abb9d6a1a57f3825d2bca49cf
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.9
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.9
- https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf
- https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- USN-3879-1
- USN-3879-1
- USN-3879-2
- USN-3879-2
- USN-4094-1
- USN-4094-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-20511
An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9824dfae5741275473a23a7ed5756c7b6efacc9d
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9824dfae5741275473a23a7ed5756c7b6efacc9d
- 106347
- 106347
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.11
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.11
- https://github.com/torvalds/linux/commit/9824dfae5741275473a23a7ed5756c7b6efacc9d
- https://github.com/torvalds/linux/commit/9824dfae5741275473a23a7ed5756c7b6efacc9d
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- https://lkml.org/lkml/2018/9/27/480
- https://lkml.org/lkml/2018/9/27/480
- USN-4094-1
- USN-4094-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-20855
An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.
- openSUSE-SU-2019:1924
- openSUSE-SU-2019:1924
- openSUSE-SU-2019:1923
- openSUSE-SU-2019:1923
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.7
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.7
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0625b4ba1a5d4703c7fb01c497bd6c156908af00
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0625b4ba1a5d4703c7fb01c497bd6c156908af00
- https://github.com/torvalds/linux/commit/0625b4ba1a5d4703c7fb01c497bd6c156908af00
- https://github.com/torvalds/linux/commit/0625b4ba1a5d4703c7fb01c497bd6c156908af00
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://security.netapp.com/advisory/ntap-20190905-0002/
Modified: 2024-11-21
CVE-2018-20856
An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.
- http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
- http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- RHSA-2019:3055
- RHSA-2019:3055
- RHSA-2019:3076
- RHSA-2019:3076
- RHSA-2019:3089
- RHSA-2019:3089
- RHSA-2019:3217
- RHSA-2019:3217
- RHSA-2020:0100
- RHSA-2020:0100
- RHSA-2020:0103
- RHSA-2020:0103
- RHSA-2020:0543
- RHSA-2020:0543
- RHSA-2020:0664
- RHSA-2020:0664
- RHSA-2020:0698
- RHSA-2020:0698
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.7
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.7
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54648cf1ec2d7f4b6a71767799c45676a138ca24
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54648cf1ec2d7f4b6a71767799c45676a138ca24
- https://github.com/torvalds/linux/commit/54648cf1ec2d7f4b6a71767799c45676a138ca24
- https://github.com/torvalds/linux/commit/54648cf1ec2d7f4b6a71767799c45676a138ca24
- [debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update
- [debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update
- 20190813 [SECURITY] [DSA 4497-1] linux security update
- 20190813 [SECURITY] [DSA 4497-1] linux security update
- 20190814 [slackware-security] Slackware 14.2 kernel (SSA:2019-226-01)
- 20190814 [slackware-security] Slackware 14.2 kernel (SSA:2019-226-01)
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://support.f5.com/csp/article/K14673240?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K14673240?utm_source=f5support&%3Butm_medium=RSS
- USN-4094-1
- USN-4094-1
- USN-4116-1
- USN-4116-1
- USN-4118-1
- USN-4118-1
- DSA-4497
- DSA-4497
Modified: 2024-11-21
CVE-2018-20976
An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2181
- openSUSE-SU-2019:2181
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- RHSA-2020:0178
- RHSA-2020:0178
- RHSA-2020:0543
- RHSA-2020:0543
- RHSA-2020:0592
- RHSA-2020:0592
- RHSA-2020:0609
- RHSA-2020:0609
- RHSA-2020:0661
- RHSA-2020:0661
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
- [debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
- [debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://support.f5.com/csp/article/K10269585?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K10269585?utm_source=f5support&%3Butm_medium=RSS
- USN-4144-1
- USN-4144-1
- USN-4145-1
- USN-4145-1
Modified: 2024-11-21
CVE-2018-21008
An issue was discovered in the Linux kernel before 4.16.7. A use-after-free can be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c.
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2181
- openSUSE-SU-2019:2181
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.7
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.7
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=abd39c6ded9db53aa44c2540092bdd5fb6590fa8
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=abd39c6ded9db53aa44c2540092bdd5fb6590fa8
- [debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
- [debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- https://security.netapp.com/advisory/ntap-20191004-0001/
- https://security.netapp.com/advisory/ntap-20191004-0001/
- USN-4162-1
- USN-4162-1
- USN-4162-2
- USN-4162-2
- USN-4163-1
- USN-4163-1
- USN-4163-2
- USN-4163-2
Modified: 2024-11-21
CVE-2018-25020
The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- https://github.com/torvalds/linux/commit/050fad7c4534c13c8eb1d9c2ba66012e014773cb
- https://github.com/torvalds/linux/commit/050fad7c4534c13c8eb1d9c2ba66012e014773cb
- https://security.netapp.com/advisory/ntap-20211229-0005/
- https://security.netapp.com/advisory/ntap-20211229-0005/
Modified: 2024-11-21
CVE-2018-5390
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en
- [oss-security] 20190628 Re: linux-distros membership application - Microsoft
- [oss-security] 20190628 Re: linux-distros membership application - Microsoft
- [oss-security] 20190706 Re: linux-distros membership application - Microsoft
- [oss-security] 20190706 Re: linux-distros membership application - Microsoft
- [oss-security] 20190706 Re: linux-distros membership application - Microsoft
- [oss-security] 20190706 Re: linux-distros membership application - Microsoft
- 104976
- 104976
- 1041424
- 1041424
- 1041434
- 1041434
- RHSA-2018:2384
- RHSA-2018:2384
- RHSA-2018:2395
- RHSA-2018:2395
- RHSA-2018:2402
- RHSA-2018:2402
- RHSA-2018:2403
- RHSA-2018:2403
- RHSA-2018:2645
- RHSA-2018:2645
- RHSA-2018:2776
- RHSA-2018:2776
- RHSA-2018:2785
- RHSA-2018:2785
- RHSA-2018:2789
- RHSA-2018:2789
- RHSA-2018:2790
- RHSA-2018:2790
- RHSA-2018:2791
- RHSA-2018:2791
- RHSA-2018:2924
- RHSA-2018:2924
- RHSA-2018:2933
- RHSA-2018:2933
- RHSA-2018:2948
- RHSA-2018:2948
- https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- [debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update
- [debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update
- https://security.netapp.com/advisory/ntap-20180815-0003/
- https://security.netapp.com/advisory/ntap-20180815-0003/
- https://support.f5.com/csp/article/K95343321
- https://support.f5.com/csp/article/K95343321
- https://support.f5.com/csp/article/K95343321?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K95343321?utm_source=f5support&%3Butm_medium=RSS
- 20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018
- 20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018
- USN-3732-1
- USN-3732-1
- USN-3732-2
- USN-3732-2
- USN-3741-1
- USN-3741-1
- USN-3741-2
- USN-3741-2
- USN-3742-1
- USN-3742-1
- USN-3742-2
- USN-3742-2
- USN-3763-1
- USN-3763-1
- https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack
- https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack
- DSA-4266
- DSA-4266
- VU#962459
- VU#962459
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.synology.com/support/security/Synology_SA_18_41
- https://www.synology.com/support/security/Synology_SA_18_41
Modified: 2024-11-21
CVE-2018-5391
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-en
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-en
- [oss-security] 20190628 Re: linux-distros membership application - Microsoft
- [oss-security] 20190628 Re: linux-distros membership application - Microsoft
- [oss-security] 20190706 Re: linux-distros membership application - Microsoft
- [oss-security] 20190706 Re: linux-distros membership application - Microsoft
- [oss-security] 20190706 Re: linux-distros membership application - Microsoft
- [oss-security] 20190706 Re: linux-distros membership application - Microsoft
- 105108
- 105108
- 1041476
- 1041476
- 1041637
- 1041637
- RHSA-2018:2785
- RHSA-2018:2785
- RHSA-2018:2791
- RHSA-2018:2791
- RHSA-2018:2846
- RHSA-2018:2846
- RHSA-2018:2924
- RHSA-2018:2924
- RHSA-2018:2925
- RHSA-2018:2925
- RHSA-2018:2933
- RHSA-2018:2933
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- RHSA-2018:3459
- RHSA-2018:3459
- RHSA-2018:3540
- RHSA-2018:3540
- RHSA-2018:3586
- RHSA-2018:3586
- RHSA-2018:3590
- RHSA-2018:3590
- https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f
- [debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update
- [debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://security.netapp.com/advisory/ntap-20181003-0002/
- https://security.netapp.com/advisory/ntap-20181003-0002/
- https://support.f5.com/csp/article/K74374841?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K74374841?utm_source=f5support&%3Butm_medium=RSS
- USN-3740-1
- USN-3740-1
- USN-3740-2
- USN-3740-2
- USN-3741-1
- USN-3741-1
- USN-3741-2
- USN-3741-2
- USN-3742-1
- USN-3742-1
- USN-3742-2
- USN-3742-2
- DSA-4272
- DSA-4272
- VU#641765
- VU#641765
Modified: 2024-11-21
CVE-2018-6412
In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c in the Linux kernel through 4.15, an integer signedness error allows arbitrary information leakage for the FBIOPUTCMAP_SPARC and FBIOGETCMAP_SPARC commands.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=250c6c49e3b68756b14983c076183568636e2bde
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=250c6c49e3b68756b14983c076183568636e2bde
- https://github.com/torvalds/linux/commit/250c6c49e3b68756b14983c076183568636e2bde
- https://github.com/torvalds/linux/commit/250c6c49e3b68756b14983c076183568636e2bde
- https://marc.info/?l=linux-fbdev&m=151734425901499&w=2
- https://marc.info/?l=linux-fbdev&m=151734425901499&w=2
Modified: 2024-11-21
CVE-2018-6554
Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.
- 105302
- 105302
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- USN-3775-1
- USN-3775-1
- USN-3775-2
- USN-3775-2
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- USN-3777-3
- USN-3777-3
- DSA-4308
- DSA-4308
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
Modified: 2024-11-21
CVE-2018-6555
The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.
- 105304
- 105304
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3775-1
- USN-3775-1
- USN-3775-2
- USN-3775-2
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- USN-3777-3
- USN-3777-3
- DSA-4308
- DSA-4308
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
Modified: 2024-11-21
CVE-2018-7273
In the Linux kernel through 4.15.4, the floppy driver reveals the addresses of kernel functions and global variables using printk calls within the function show_floppy in drivers/block/floppy.c. An attacker can read this information from dmesg and use the addresses to find the locations of kernel code and data and bypass kernel security protections such as KASLR.
Modified: 2024-11-21
CVE-2018-7740
The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.
- 103316
- 103316
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=199037
- https://bugzilla.kernel.org/show_bug.cgi?id=199037
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- USN-3910-1
- USN-3910-1
- USN-3910-2
- USN-3910-2
- DSA-4187
- DSA-4187
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2018-7754
The aoedisk_debugfs_show function in drivers/block/aoe/aoeblk.c in the Linux kernel through 4.16.4rc4 allows local users to obtain sensitive address information by reading "ffree: " lines in a debugfs file.
- https://elixir.bootlin.com/linux/v4.16-rc4/source/drivers/block/aoe/aoeblk.c#L421
- https://elixir.bootlin.com/linux/v4.16-rc4/source/drivers/block/aoe/aoeblk.c#L421
- https://github.com/johnsonwangqize/cve-linux/blob/master/CVE-2018-7754.md
- https://github.com/johnsonwangqize/cve-linux/blob/master/CVE-2018-7754.md
Modified: 2024-11-21
CVE-2018-7755
An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://lkml.org/lkml/2018/3/7/1116
- https://lkml.org/lkml/2018/3/7/1116
- USN-3695-1
- USN-3695-1
- USN-3695-2
- USN-3695-2
- USN-3696-1
- USN-3696-1
- USN-3696-2
- USN-3696-2
- USN-3697-1
- USN-3697-1
- USN-3697-2
- USN-3697-2
- USN-3698-1
- USN-3698-1
- USN-3698-2
- USN-3698-2
- DSA-4308
- DSA-4308
Modified: 2024-11-21
CVE-2018-7757
Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4a491b1ab11ca0556d2fda1ff1301e862a2d44c4
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4a491b1ab11ca0556d2fda1ff1301e862a2d44c4
- 103348
- 103348
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://github.com/torvalds/linux/commit/4a491b1ab11ca0556d2fda1ff1301e862a2d44c4
- https://github.com/torvalds/linux/commit/4a491b1ab11ca0556d2fda1ff1301e862a2d44c4
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- USN-3654-1
- USN-3654-1
- USN-3654-2
- USN-3654-2
- USN-3656-1
- USN-3656-1
- USN-3697-1
- USN-3697-1
- USN-3697-2
- USN-3697-2
- USN-3698-1
- USN-3698-1
- USN-3698-2
- USN-3698-2
- DSA-4187
- DSA-4187
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2018-7995
Race condition in the store_int_with_restart() function in arch/x86/kernel/cpu/mcheck/mce.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (panic) by leveraging root access to write to the check_interval file in a /sys/devices/system/machinecheck/machinecheck
- 103356
- 103356
- https://bugzilla.suse.com/show_bug.cgi?id=1084755
- https://bugzilla.suse.com/show_bug.cgi?id=1084755
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b3b7c4795ccab5be71f080774c45bbbcc75c2aaf
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b3b7c4795ccab5be71f080774c45bbbcc75c2aaf
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- https://lkml.org/lkml/2018/3/2/970
- https://lkml.org/lkml/2018/3/2/970
- USN-3654-1
- USN-3654-1
- USN-3654-2
- USN-3654-2
- USN-3656-1
- USN-3656-1
- DSA-4187
- DSA-4187
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2018-8043
The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5
- 1040749
- 1040749
- https://github.com/torvalds/linux/commit/297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5
- https://github.com/torvalds/linux/commit/297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3630-1
- USN-3630-1
- USN-3630-2
- USN-3630-2
- USN-3632-1
- USN-3632-1
Modified: 2024-11-21
CVE-2018-8087
Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ddcff49b672239dda94d70d0fcf50317a9f4b51
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ddcff49b672239dda94d70d0fcf50317a9f4b51
- 103397
- 103397
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- https://github.com/torvalds/linux/commit/0ddcff49b672239dda94d70d0fcf50317a9f4b51
- https://github.com/torvalds/linux/commit/0ddcff49b672239dda94d70d0fcf50317a9f4b51
- USN-3676-1
- USN-3676-1
- USN-3676-2
- USN-3676-2
- USN-3677-1
- USN-3677-1
- USN-3677-2
- USN-3677-2
- USN-3678-1
- USN-3678-1
- USN-3678-2
- USN-3678-2
- USN-3678-3
- USN-3678-3
- USN-3678-4
- USN-3678-4
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2018-8822
Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.
- [oss-security] 20221227 Re: Details on this supposed Linux Kernel ksmbd RCE
- [oss-security] 20221227 Re: Details on this supposed Linux Kernel ksmbd RCE
- 103476
- 103476
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- USN-3653-1
- USN-3653-1
- USN-3653-2
- USN-3653-2
- USN-3654-1
- USN-3654-1
- USN-3654-2
- USN-3654-2
- USN-3655-1
- USN-3655-1
- USN-3655-2
- USN-3655-2
- USN-3656-1
- USN-3656-1
- USN-3657-1
- USN-3657-1
- DSA-4187
- DSA-4187
- DSA-4188
- DSA-4188
- https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html
- https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html
Modified: 2024-11-21
CVE-2019-10207
A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.
Modified: 2024-11-21
CVE-2019-14763
In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid.
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.4
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.4
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=072684e8c58d17e853f8e8b9f6d9ce2e58d2b036
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=072684e8c58d17e853f8e8b9f6d9ce2e58d2b036
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c91815b596245fd7da349ecc43c8def670d2269e
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c91815b596245fd7da349ecc43c8def670d2269e
- https://github.com/torvalds/linux/commit/072684e8c58d17e853f8e8b9f6d9ce2e58d2b036
- https://github.com/torvalds/linux/commit/072684e8c58d17e853f8e8b9f6d9ce2e58d2b036
- https://github.com/torvalds/linux/commit/c91815b596245fd7da349ecc43c8def670d2269e
- https://github.com/torvalds/linux/commit/c91815b596245fd7da349ecc43c8def670d2269e
- USN-4115-1
- USN-4115-1
- USN-4118-1
- USN-4118-1
- https://www.spinics.net/lists/linux-usb/msg167355.html
- https://www.spinics.net/lists/linux-usb/msg167355.html
- https://www.spinics.net/lists/linux-usb/msg167393.html
- https://www.spinics.net/lists/linux-usb/msg167393.html
Modified: 2024-11-21
CVE-2019-16921
In the Linux kernel before 4.17, hns_roce_alloc_ucontext in drivers/infiniband/hw/hns/hns_roce_main.c does not initialize the resp data structure, which might allow attackers to obtain sensitive information from kernel stack memory, aka CID-df7e40425813.
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df7e40425813c50cd252e6f5e348a81ef1acae56
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df7e40425813c50cd252e6f5e348a81ef1acae56
- https://github.com/torvalds/linux/commit/df7e40425813c50cd252e6f5e348a81ef1acae56
- https://github.com/torvalds/linux/commit/df7e40425813c50cd252e6f5e348a81ef1acae56
Modified: 2024-11-21
CVE-2019-3701
An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.
- openSUSE-SU-2020:0543
- openSUSE-SU-2020:0543
- 106443
- 106443
- https://bugzilla.suse.com/show_bug.cgi?id=1120386
- https://bugzilla.suse.com/show_bug.cgi?id=1120386
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://marc.info/?l=linux-netdev&m=154651842302479&w=2
- https://marc.info/?l=linux-netdev&m=154651842302479&w=2
- https://marc.info/?l=linux-netdev&m=154661373531512&w=2
- https://marc.info/?l=linux-netdev&m=154661373531512&w=2
- https://support.f5.com/csp/article/K17957133
- https://support.f5.com/csp/article/K17957133
- USN-3932-1
- USN-3932-1
- USN-3932-2
- USN-3932-2
- USN-4115-1
- USN-4115-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2019-5489
The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e
- openSUSE-SU-2019:1479
- openSUSE-SU-2019:1479
- openSUSE-SU-2019:1570
- openSUSE-SU-2019:1570
- openSUSE-SU-2019:1579
- openSUSE-SU-2019:1579
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en
- 106478
- 106478
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- RHSA-2019:2473
- RHSA-2019:2473
- RHSA-2019:2808
- RHSA-2019:2808
- RHSA-2019:2809
- RHSA-2019:2809
- RHSA-2019:2837
- RHSA-2019:2837
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- RHSA-2019:3967
- RHSA-2019:3967
- RHSA-2019:4056
- RHSA-2019:4056
- RHSA-2019:4057
- RHSA-2019:4057
- RHSA-2019:4058
- RHSA-2019:4058
- RHSA-2019:4159
- RHSA-2019:4159
- RHSA-2019:4164
- RHSA-2019:4164
- RHSA-2019:4255
- RHSA-2019:4255
- RHSA-2020:0204
- RHSA-2020:0204
- https://arxiv.org/abs/1901.01161
- https://arxiv.org/abs/1901.01161
- https://bugzilla.suse.com/show_bug.cgi?id=1120843
- https://bugzilla.suse.com/show_bug.cgi?id=1120843
- https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e
- https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update
- [debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update
- [debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update
- 20190618 [SECURITY] [DSA 4465-1] linux security update
- 20190618 [SECURITY] [DSA 4465-1] linux security update
- https://security.netapp.com/advisory/ntap-20190307-0001/
- https://security.netapp.com/advisory/ntap-20190307-0001/
- DSA-4465
- DSA-4465
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/
- https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/
Modified: 2024-11-21
CVE-2020-10774
A memory disclosure flaw was found in the Linux kernel's versions before 4.18.0-193.el8 in the sysctl subsystem when reading the /proc/sys/kernel/rh_features file. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.
Modified: 2024-11-21
CVE-2021-20219
A denial of service vulnerability was found in n_tty_receive_char_special in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could delay the loop (due to a changing ldata->read_head, and a missing sanity check) and cause a threat to the system availability.