VYPR

rpm package

suse/kernel-syms&distro=SUSE Linux Enterprise Server 12 SP2-BCL

pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Vulnerabilities (580)

  • CVE-2019-14283Jul 26, 2019
    affected < 4.4.121-92.120.1fixed 4.4.121-92.120.1

    In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU c

  • CVE-2018-20856Jul 26, 2019
    affected < 4.4.121-92.120.1fixed 4.4.121-92.120.1

    An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.

  • CVE-2018-20855Jul 26, 2019
    affected < 4.4.121-92.120.1fixed 4.4.121-92.120.1

    An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.

  • CVE-2019-13631Jul 17, 2019
    affected < 4.4.121-92.120.1fixed 4.4.121-92.120.1

    In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.

  • CVE-2019-13272KEVJul 17, 2019
    affected < 4.4.121-92.125.1fixed 4.4.121-92.125.1

    In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relati

  • CVE-2019-10639Jul 5, 2019
    affected < 4.4.121-92.117.1fixed 4.4.121-92.117.1

    The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connectio

  • CVE-2019-10638Jul 5, 2019
    affected < 4.4.121-92.117.1fixed 4.4.121-92.117.1

    In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of ind

  • CVE-2019-2024Jun 19, 2019
    affected < 4.4.121-92.104.1fixed 4.4.121-92.104.1

    In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:

  • CVE-2019-11479Jun 18, 2019
    affected < 4.4.121-92.114.1fixed 4.4.121-92.114.1

    Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixe

  • CVE-2019-11478Jun 18, 2019
    affected < 4.4.121-92.114.1fixed 4.4.121-92.114.1

    Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fi

  • CVE-2019-11477Jun 18, 2019
    affected < 4.4.121-92.114.1fixed 4.4.121-92.114.1

    Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel

  • CVE-2019-10126Jun 14, 2019
    affected < 4.4.121-92.117.1fixed 4.4.121-92.117.1

    A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.

  • CVE-2019-12819Jun 14, 2019
    affected < 4.4.121-92.117.1fixed 4.4.121-92.117.1

    An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.

  • CVE-2019-12818Jun 14, 2019
    affected < 4.4.121-92.117.1fixed 4.4.121-92.117.1

    An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_buil

  • CVE-2019-0136Jun 13, 2019
    affected < 4.4.121-92.164.1fixed 4.4.121-92.164.1

    Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

  • CVE-2019-12614Jun 3, 2019
    affected < 4.4.121-92.117.1fixed 4.4.121-92.117.1

    An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).

  • CVE-2019-3846Jun 3, 2019
    affected < 4.4.121-92.114.1fixed 4.4.121-92.114.1

    A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.

  • CVE-2018-12130May 30, 2019
    affected < 4.4.121-92.109.2fixed 4.4.121-92.109.2

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h

  • CVE-2018-12127May 30, 2019
    affected < 4.4.121-92.109.2fixed 4.4.121-92.109.2

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

  • CVE-2018-12126May 30, 2019
    affected < 4.4.121-92.109.2fixed 4.4.121-92.109.2

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found

Page 23 of 29