VYPR

rpm package

suse/kernel-source-azure&distro=SUSE Linux Enterprise Server 12 SP3

pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3

Vulnerabilities (73)

  • CVE-2019-2024Jun 19, 2019
    affected < 4.4.176-4.25.1fixed 4.4.176-4.25.1

    In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:

  • CVE-2019-11479Jun 18, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixe

  • CVE-2019-11478Jun 18, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fi

  • CVE-2019-11477Jun 18, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel

  • CVE-2019-3846Jun 3, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.

  • CVE-2019-12382May 28, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor

  • CVE-2018-7191May 17, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. Th

  • CVE-2019-11833May 15, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.

  • CVE-2019-11884May 10, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.

  • CVE-2019-11815May 8, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.

  • CVE-2019-11486Apr 23, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.

  • CVE-2019-11190Apr 11, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.

  • CVE-2019-3460Apr 11, 2019
    affected < 4.4.176-4.25.1fixed 4.4.176-4.25.1

    A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.

  • CVE-2019-3459Apr 11, 2019
    affected < 4.4.176-4.25.1fixed 4.4.176-4.25.1

    A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.

  • CVE-2018-19985Mar 17, 2019
    affected < 4.4.170-4.22.1fixed 4.4.170-4.22.1

    The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address

  • CVE-2019-7222Mar 17, 2019
    affected < 4.4.176-4.25.1fixed 4.4.176-4.25.1

    The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.

  • CVE-2019-7221Mar 17, 2019
    affected < 4.4.176-4.25.1fixed 4.4.176-4.25.1

    The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.

  • CVE-2019-9213Mar 5, 2019
    affected < 4.4.176-4.25.1fixed 4.4.176-4.25.1

    In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.

  • CVE-2019-6974Feb 15, 2019
    affected < 4.4.176-4.25.1fixed 4.4.176-4.25.1

    In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.

  • CVE-2019-5489Jan 7, 2019
    affected < 4.4.180-4.31.1fixed 4.4.180-4.31.1

    The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincor

Page 1 of 4