VYPR

rpm package

suse/kgraft-patch-SLE12-SP2_Update_27&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP2

pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2

Vulnerabilities (24)

  • CVE-2019-14897Nov 29, 2019
    affected < 8-2.1fixed 8-2.1

    A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together

  • CVE-2019-10220Nov 27, 2019
    affected < 6-2.1fixed 6-2.1

    Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.

  • CVE-2019-14896Nov 27, 2019
    affected < 8-2.1fixed 8-2.1

    A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called a

  • CVE-2019-17133Oct 4, 2019
    affected < 6-2.1fixed 6-2.1

    In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.

  • CVE-2019-14835Sep 17, 2019
    affected < 5-2.1fixed 5-2.1

    A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the

  • CVE-2018-20856Jul 26, 2019
    affected < 7-2.5fixed 7-2.5

    An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.

  • CVE-2019-13272KEVJul 17, 2019
    affected < 7-2.5fixed 7-2.5

    In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relati

  • CVE-2019-11478Jun 18, 2019
    affected < 3-2.1fixed 3-2.1

    Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fi

  • CVE-2019-11477Jun 18, 2019
    affected < 3-2.1fixed 3-2.1

    Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel

  • CVE-2019-3846Jun 3, 2019
    affected < 3-2.1fixed 3-2.1

    A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.

  • CVE-2019-11487Apr 23, 2019
    affected < 3-2.1fixed 3-2.1

    The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm

  • CVE-2019-3460Apr 11, 2019
    affected < 1-3.3.1fixed 1-3.3.1

    A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.

  • CVE-2019-3459Apr 11, 2019
    affected < 1-3.3.1fixed 1-3.3.1

    A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.

  • CVE-2018-19985Mar 17, 2019
    affected < 1-3.3.1fixed 1-3.3.1

    The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address

  • CVE-2018-16884Dec 18, 2018
    affected < 1-3.3.1fixed 1-3.3.1

    A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel m

  • CVE-2018-20169Dec 17, 2018
    affected < 1-3.3.1fixed 1-3.3.1

    An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.

  • CVE-2018-9568Dec 6, 2018
    affected < 1-3.3.1fixed 1-3.3.1

    In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. A

  • CVE-2018-19824Dec 3, 2018
    affected < 1-3.3.1fixed 1-3.3.1

    In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.

  • CVE-2018-16862Nov 26, 2018
    affected < 1-3.3.1fixed 1-3.3.1

    A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.

  • CVE-2018-9516Nov 6, 2018
    affected < 1-3.3.1fixed 1-3.3.1

    In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android

Page 1 of 2