VYPR

rpm package

suse/kernel-docs&distro=SUSE Linux Enterprise Module for Development Tools 15 SP1

pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1

Vulnerabilities (276)

  • CVE-2019-10639Jul 5, 2019
    affected < 4.12.14-197.10.1fixed 4.12.14-197.10.1

    The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connectio

  • CVE-2019-10638Jul 5, 2019
    affected < 4.12.14-197.10.1fixed 4.12.14-197.10.1

    In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of ind

  • CVE-2019-13233Jul 4, 2019
    affected < 4.12.14-197.10.1fixed 4.12.14-197.10.1

    In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.

  • CVE-2019-12817Jun 25, 2019
    affected < 4.12.14-197.7.1fixed 4.12.14-197.7.1

    arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.

  • CVE-2019-11479Jun 18, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixe

  • CVE-2019-11478Jun 18, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fi

  • CVE-2019-11477Jun 18, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel

  • CVE-2019-10126Jun 14, 2019
    affected < 4.12.14-197.10.1fixed 4.12.14-197.10.1

    A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.

  • CVE-2019-12819Jun 14, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.

  • CVE-2019-12818Jun 14, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_buil

  • CVE-2019-12614Jun 3, 2019
    affected < 4.12.14-197.7.1fixed 4.12.14-197.7.1

    An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).

  • CVE-2019-3846Jun 3, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.

  • CVE-2018-12130May 30, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h

  • CVE-2018-12127May 30, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

  • CVE-2018-12126May 30, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found

  • CVE-2019-11091May 30, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c

  • CVE-2019-12382May 28, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor

  • CVE-2019-11085May 17, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

  • CVE-2018-7191May 17, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. Th

  • CVE-2019-11833May 15, 2019
    affected < 4.12.14-197.4.1fixed 4.12.14-197.4.1

    fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.

Page 13 of 14