VYPR

rpm package

suse/kernel-syms&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP2

pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2

Vulnerabilities (431)

  • CVE-2018-7191May 17, 2019
    affected < 4.4.121-92.114.1fixed 4.4.121-92.114.1

    In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. Th

  • CVE-2019-11833May 15, 2019
    affected < 4.4.121-92.114.1fixed 4.4.121-92.114.1

    fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.

  • CVE-2019-11884May 10, 2019
    affected < 4.4.121-92.114.1fixed 4.4.121-92.114.1

    The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.

  • CVE-2019-11815May 8, 2019
    affected < 4.4.121-92.114.1fixed 4.4.121-92.114.1

    An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.

  • CVE-2018-20836May 7, 2019
    affected < 4.4.121-92.117.1fixed 4.4.121-92.117.1

    An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.

  • CVE-2019-11810May 7, 2019
    affected < 4.4.121-92.120.1fixed 4.4.121-92.120.1

    An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.

  • CVE-2019-11599Apr 29, 2019
    affected < 4.4.121-92.117.1fixed 4.4.121-92.117.1

    The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other

  • CVE-2019-3882Apr 24, 2019
    affected < 4.4.121-92.109.2fixed 4.4.121-92.109.2

    A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a syste

  • CVE-2019-11487Apr 23, 2019
    affected < 4.4.121-92.117.1fixed 4.4.121-92.117.1

    The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm

  • CVE-2019-11486Apr 23, 2019
    affected < 4.4.121-92.109.2fixed 4.4.121-92.109.2

    The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.

  • CVE-2019-11190Apr 11, 2019
    affected < 4.4.121-92.114.1fixed 4.4.121-92.114.1

    The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.

  • CVE-2019-3460Apr 11, 2019
    affected < 4.4.121-92.101.1fixed 4.4.121-92.101.1

    A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.

  • CVE-2019-3459Apr 11, 2019
    affected < 4.4.121-92.101.1fixed 4.4.121-92.101.1

    A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.

  • CVE-2018-19985Mar 17, 2019
    affected < 4.4.121-92.101.1fixed 4.4.121-92.101.1

    The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address

  • CVE-2019-7222Mar 17, 2019
    affected < 4.4.121-92.104.1fixed 4.4.121-92.104.1

    The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.

  • CVE-2019-7221Mar 17, 2019
    affected < 4.4.121-92.104.1fixed 4.4.121-92.104.1

    The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.

  • CVE-2019-9213Mar 5, 2019
    affected < 4.4.121-92.104.1fixed 4.4.121-92.104.1

    In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.

  • CVE-2019-6974Feb 15, 2019
    affected < 4.4.121-92.104.1fixed 4.4.121-92.104.1

    In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.

  • CVE-2019-3819Jan 25, 2019
    affected < 4.4.121-92.120.1fixed 4.4.121-92.120.1

    A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ("root") can cause a system lock up and a denial of service. Vers

  • CVE-2019-6133Jan 11, 2019
    affected < 4.4.121-92.149.1fixed 4.4.121-92.149.1

    In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

Page 11 of 22