VYPR

rpm package

suse/kernel-source-azure&distro=SUSE Linux Enterprise Module for Public Cloud 15

pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015

Vulnerabilities (193)

  • CVE-2019-15220Aug 19, 2019
    affected < 4.12.14-5.41.1fixed 4.12.14-5.41.1

    An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.

  • CVE-2019-15221Aug 19, 2019
    affected < 4.12.14-5.41.1fixed 4.12.14-5.41.1

    An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.

  • CVE-2019-15222Aug 19, 2019
    affected < 4.12.14-5.41.1fixed 4.12.14-5.41.1

    An issue was discovered in the Linux kernel before 5.2.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver.

  • CVE-2018-20976Aug 19, 2019
    affected < 4.12.14-5.41.1fixed 4.12.14-5.41.1

    An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.

  • CVE-2017-18551Aug 19, 2019
    affected < 4.12.14-5.41.1fixed 4.12.14-5.41.1

    An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.

  • CVE-2019-15117Aug 16, 2019
    affected < 4.12.14-5.41.1fixed 4.12.14-5.41.1

    parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.

  • CVE-2019-15118Aug 16, 2019
    affected < 4.12.14-5.41.1fixed 4.12.14-5.41.1

    check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.

  • CVE-2019-15098Aug 16, 2019
    affected < 4.12.14-5.41.1fixed 4.12.14-5.41.1

    drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.

  • CVE-2019-15090Aug 15, 2019
    affected < 4.12.14-5.41.1fixed 4.12.14-5.41.1

    An issue was discovered in drivers/scsi/qedi/qedi_dbg.c in the Linux kernel before 5.1.12. In the qedi_dbg_* family of functions, there is an out-of-bounds read.

  • CVE-2019-9506Aug 14, 2019
    affected < 4.12.14-5.41.1fixed 4.12.14-5.41.1

    The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inje

  • CVE-2018-16871Jul 30, 2019
    affected < 4.12.14-5.33.1fixed 4.12.14-5.33.1

    A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine an

  • CVE-2019-14284Jul 26, 2019
    affected < 4.12.14-5.38.1fixed 4.12.14-5.38.1

    In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Nex

  • CVE-2019-14283Jul 26, 2019
    affected < 4.12.14-5.38.1fixed 4.12.14-5.38.1

    In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU c

  • CVE-2018-20855Jul 26, 2019
    affected < 4.12.14-5.38.1fixed 4.12.14-5.38.1

    An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.

  • CVE-2019-13648Jul 19, 2019
    affected < 4.12.14-5.38.1fixed 4.12.14-5.38.1

    In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/power

  • CVE-2019-13631Jul 17, 2019
    affected < 4.12.14-5.38.1fixed 4.12.14-5.38.1

    In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.

  • CVE-2019-10639Jul 5, 2019
    affected < 4.12.14-5.33.1fixed 4.12.14-5.33.1

    The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connectio

  • CVE-2019-10638Jul 5, 2019
    affected < 4.12.14-5.33.1fixed 4.12.14-5.33.1

    In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of ind

  • CVE-2019-2024Jun 19, 2019
    affected < 4.12.14-5.24.1fixed 4.12.14-5.24.1

    In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:

  • CVE-2019-11479Jun 18, 2019
    affected < 4.12.14-5.30.1fixed 4.12.14-5.30.1

    Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixe

Page 5 of 10