VYPR

rpm package

suse/kgraft-patch-SLE12-SP2_Update_29&distro=SUSE Linux Enterprise Server 12 SP2-LTSS

pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_29&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS

Vulnerabilities (32)

  • CVE-2019-3882Apr 24, 2019
    affected < 1-3.5.2fixed 1-3.5.2

    A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a syste

  • CVE-2019-11487Apr 23, 2019
    affected < 3-2.1fixed 3-2.1

    The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm

  • CVE-2019-11486Apr 23, 2019
    affected < 1-3.5.2fixed 1-3.5.2

    The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.

  • CVE-2018-19407Nov 21, 2018
    affected < 1-3.5.2fixed 1-3.5.2

    The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.

  • CVE-2018-5390Aug 6, 2018
    affected < 2-2.1fixed 2-2.1

    Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.

  • CVE-2018-1129Jul 10, 2018
    affected < 1-3.5.2fixed 1-3.5.2

    A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, lumi

  • CVE-2018-1128Jul 10, 2018
    affected < 1-3.5.2fixed 1-3.5.2

    It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and p

  • CVE-2018-1120Jun 20, 2018
    affected < 1-3.5.2fixed 1-3.5.2

    A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which m

  • CVE-2018-1091Mar 27, 2018
    affected < 1-3.5.2fixed 1-3.5.2

    In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transact

  • CVE-2017-18174Feb 11, 2018
    affected < 1-3.5.2fixed 1-3.5.2

    In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.

  • CVE-2017-17741MedDec 18, 2017
    affected < 1-3.5.2fixed 1-3.5.2

    The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.

  • CVE-2016-8636HigFeb 22, 2017
    affected < 1-3.5.2fixed 1-3.5.2

    Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact

Page 2 of 2