VYPR

rpm package

suse/kgraft-patch-SLE12_Update_38&distro=SUSE Linux Enterprise Server 12-LTSS

pkg:rpm/suse/kgraft-patch-SLE12_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS

Vulnerabilities (32)

  • CVE-2019-11478Jun 18, 2019
    affected < 7-2.1fixed 7-2.1

    Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fi

  • CVE-2019-11477Jun 18, 2019
    affected < 7-2.1fixed 7-2.1

    Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel

  • CVE-2019-3846Jun 3, 2019
    affected < 7-2.1fixed 7-2.1

    A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.

  • CVE-2019-11487Apr 23, 2019
    affected < 7-2.1fixed 7-2.1

    The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm

  • CVE-2019-7221Mar 17, 2019
    affected < 6-2.1fixed 6-2.1

    The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.

  • CVE-2019-9213Mar 5, 2019
    affected < 6-2.1fixed 6-2.1

    In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.

  • CVE-2018-16884Dec 18, 2018
    affected < 5-2.1fixed 5-2.1

    A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel m

  • CVE-2018-9568Dec 6, 2018
    affected < 4-2.1fixed 4-2.1

    In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. A

  • CVE-2018-18386Oct 17, 2018
    affected < 3-2.1fixed 3-2.1

    drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.

  • CVE-2018-14634KEVSep 25, 2018
    affected < 1-1.5.1fixed 1-1.5.1

    An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are beli

  • CVE-2018-14633Sep 25, 2018
    affected < 2-2.1fixed 2-2.1

    A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes

  • CVE-2018-17182Sep 19, 2018
    affected < 1-1.5.1fixed 1-1.5.1

    An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and de

  • CVE-2018-10853Sep 11, 2018
    affected < 1-1.5.1fixed 1-1.5.1

    A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potential

  • CVE-2018-16658Sep 7, 2018
    affected < 1-1.5.1fixed 1-1.5.1

    An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to

  • CVE-2018-5391Sep 6, 2018
    affected < 6-2.1fixed 6-2.1

    The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in I

  • CVE-2018-6555Sep 4, 2018
    affected < 1-1.5.1fixed 1-1.5.1

    The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA

  • CVE-2018-6554Sep 4, 2018
    affected < 1-1.5.1fixed 1-1.5.1

    Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.

  • CVE-2018-16276Aug 31, 2018
    affected < 1-1.5.1fixed 1-1.5.1

    An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.

  • CVE-2018-10902Aug 21, 2018
    affected < 1-1.5.1fixed 1-1.5.1

    It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local a

  • CVE-2018-5390Aug 6, 2018
    affected < 2-2.1fixed 2-2.1

    Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.

Page 1 of 2