VYPR

rpm package

suse/kernel-firmware&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP3

pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3

Vulnerabilities (6)

  • CVE-2020-12321Nov 12, 2020
    affected < 20170530-21.31.1fixed 20170530-21.31.1

    Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

  • CVE-2018-5383Aug 7, 2018
    affected < 20170530-21.28.1fixed 20170530-21.28.1

    Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-

  • CVE-2015-1142857Jan 23, 2018
    affected < 20170530-21.19.1fixed 20170530-21.19.1

    On multiple SR-IOV cars it is possible for VF's assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4

  • CVE-2017-5715Jan 4, 2018
    affected < 20170530-21.16.1fixed 20170530-21.16.1

    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2017-13081MedOct 17, 2017
    affected < 20170530-21.13.1fixed 20170530-21.13.1

    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

  • CVE-2017-13080MedOct 17, 2017
    affected < 20170530-21.13.1fixed 20170530-21.13.1

    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.