VYPR

rpm package

suse/kgraft-patch-SLE12-SP3_Update_31&distro=SUSE Enterprise Storage 5

pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_31&distro=SUSE%20Enterprise%20Storage%205

Vulnerabilities (35)

  • CVE-2020-10720Sep 3, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.

  • CVE-2020-10690May 8, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if

  • CVE-2020-2732Apr 8, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 g

  • CVE-2020-11609Apr 7, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.

  • CVE-2020-11608Apr 7, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.

  • CVE-2020-11494Apr 2, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL

  • CVE-2020-10942Mar 24, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.

  • CVE-2020-9383Feb 25, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.

  • CVE-2020-8992Feb 14, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.

  • CVE-2020-8647Feb 6, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.

  • CVE-2020-8648Feb 6, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.

  • CVE-2020-8649Feb 6, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.

  • CVE-2019-14615Jan 17, 2020
    affected < 1-4.3.1fixed 1-4.3.1

    Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.

  • CVE-2019-20096Dec 30, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.

  • CVE-2019-20054Dec 28, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.

  • CVE-2019-19965Dec 25, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.

  • CVE-2019-19966Dec 25, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.

  • CVE-2019-5108Dec 23, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to d

  • CVE-2019-19767Dec 12, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.

  • CVE-2019-19768Dec 12, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).

Page 1 of 2