The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of SLES

vulnerability alert CVE-2017-12806

ImageMagick: denial of service via format8BIM

Synthesis of the vulnerability

An attacker can trigger a fatal error via format8BIM() of ImageMagick, in order to trigger a denial of service.
Impacted products: Fedora, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: denial of service on service, denial of service on client.
Provenance: document.
Creation date: 26/06/2019.
Identifiers: CVE-2017-12806, FEDORA-2019-da4c20882c, openSUSE-SU-2019:1683-1, SUSE-SU-2019:1712-1, USN-4034-1, VIGILANCE-VUL-29621.

Description of the vulnerability

An attacker can trigger a fatal error via format8BIM() of ImageMagick, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2017-12805

ImageMagick: denial of service via ReadTIFFImage

Synthesis of the vulnerability

An attacker can trigger a fatal error via ReadTIFFImage() of ImageMagick, in order to trigger a denial of service.
Impacted products: Fedora, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: denial of service on service, denial of service on client.
Provenance: document.
Creation date: 26/06/2019.
Identifiers: CVE-2017-12805, FEDORA-2019-da4c20882c, openSUSE-SU-2019:1683-1, SUSE-SU-2019:1712-1, USN-4034-1, VIGILANCE-VUL-29620.

Description of the vulnerability

An attacker can trigger a fatal error via ReadTIFFImage() of ImageMagick, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2019-12818

Linux kernel: NULL pointer dereference via nfc_llcp_build_tlv

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced via nfc_llcp_build_tlv() of the Linux kernel, in order to trigger a denial of service.
Impacted products: Linux, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 14/06/2019.
Identifiers: CERTFR-2019-AVI-330, CERTFR-2019-AVI-337, CVE-2019-12818, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1823-1, SUSE-SU-2019:1823-2, SUSE-SU-2019:1851-1, SUSE-SU-2019:1852-1, SUSE-SU-2019:1855-1, VIGILANCE-VUL-29532.

Description of the vulnerability

An attacker can force a NULL pointer to be dereferenced via nfc_llcp_build_tlv() of the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2019-12439

Bubblewrap: denial of service via Temporary Monted Directories

Synthesis of the vulnerability

An attacker can trigger a fatal error via Temporary Monted Directories of Bubblewrap, in order to trigger a denial of service.
Impacted products: openSUSE Leap, SLES.
Severity: 1/4.
Consequences: denial of service on service, denial of service on client.
Provenance: user shell.
Creation date: 11/06/2019.
Identifiers: CVE-2019-12439, openSUSE-SU-2019:1535-1, SUSE-SU-2019:1826-1, VIGILANCE-VUL-29487.

Description of the vulnerability

An attacker can trigger a fatal error via Temporary Monted Directories of Bubblewrap, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2019-12614

Linux kernel: NULL pointer dereference via dlpar_parse_cc_property

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced via dlpar_parse_cc_property() of the Linux kernel, in order to trigger a denial of service.
Impacted products: Fedora, Linux, SUSE Linux Enterprise Desktop, SLES.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: user shell.
Creation date: 04/06/2019.
Identifiers: CERTFR-2019-AVI-306, CERTFR-2019-AVI-330, CERTFR-2019-AVI-337, CVE-2019-12614, FEDORA-2019-83858fc57b, FEDORA-2019-c03eda3cc6, SUSE-SU-2019:1744-1, SUSE-SU-2019:1823-1, SUSE-SU-2019:1823-2, SUSE-SU-2019:1851-1, SUSE-SU-2019:1852-1, SUSE-SU-2019:1855-1, VIGILANCE-VUL-29456.

Description of the vulnerability

An attacker can force a NULL pointer to be dereferenced via dlpar_parse_cc_property() of the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-16871

Linux kernel: NULL pointer dereference via nfsd4_verify_copy

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced via nfsd4_verify_copy() of the Linux kernel, in order to trigger a denial of service.
Impacted products: Linux, SUSE Linux Enterprise Desktop, SLES.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service.
Provenance: user account.
Creation date: 03/06/2019.
Identifiers: CERTFR-2019-AVI-306, CERTFR-2019-AVI-337, CVE-2018-16871, SUSE-SU-2019:1744-1, SUSE-SU-2019:1851-1, SUSE-SU-2019:1855-1, VIGILANCE-VUL-29444.

Description of the vulnerability

An attacker can force a NULL pointer to be dereferenced via nfsd4_verify_copy() of the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2018-1000135

NetworkManager: information disclosure via DNS requests

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via DNS requests from NetworkManager, in order to obtain sensitive information.
Impacted products: openSUSE Leap, SLES.
Severity: 1/4.
Consequences: data reading.
Provenance: internet server.
Creation date: 29/05/2019.
Identifiers: CVE-2018-1000135, openSUSE-SU-2019:1494-1, SUSE-SU-2019:1369-1, VIGILANCE-VUL-29429.

Description of the vulnerability

An attacker can bypass access restrictions to data via DNS requests from NetworkManager, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2019-12382

Linux kernel: NULL pointer dereference via drm_load_edid_firmware

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced via drm_load_edid_firmware() of the Linux kernel, in order to trigger a denial of service.
Impacted products: Fedora, Linux, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity: 1/4.
Consequences: denial of service on server, denial of service on client.
Provenance: user account.
Creation date: 28/05/2019.
Identifiers: CVE-2019-12382, FEDORA-2019-7ec378191e, FEDORA-2019-f40bd7826f, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, VIGILANCE-VUL-29425.

Description of the vulnerability

An attacker can force a NULL pointer to be dereferenced via drm_load_edid_firmware() of the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2019-12380

Linux kernel: NULL pointer dereference via EFI

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced via EFI of the Linux kernel, in order to trigger a denial of service.
Impacted products: Fedora, Linux, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity: 1/4.
Consequences: denial of service on server, denial of service on client.
Provenance: privileged shell.
Creation date: 28/05/2019.
Identifiers: CERTFR-2019-AVI-330, CERTFR-2019-AVI-337, CVE-2019-12380, FEDORA-2019-7ec378191e, FEDORA-2019-f40bd7826f, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, SUSE-SU-2019:1823-1, SUSE-SU-2019:1823-2, SUSE-SU-2019:1852-1, SUSE-SU-2019:1855-1, VIGILANCE-VUL-29423.

Description of the vulnerability

An attacker can force a NULL pointer to be dereferenced via EFI of the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2019-11815

Linux kernel: use after free via rds_tcp_kill_sock

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via rds_tcp_kill_sock() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Linux, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service, denial of service on client.
Provenance: LAN.
Creation date: 09/05/2019.
Revision date: 24/05/2019.
Identifiers: CERTFR-2019-AVI-244, CERTFR-2019-AVI-254, CERTFR-2019-AVI-277, CVE-2019-11815, DLA-1824-1, DSA-4465-1, openSUSE-SU-2019:1404-1, openSUSE-SU-2019:1407-1, openSUSE-SU-2019:1479-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, USN-4005-1, USN-4008-1, USN-4008-3, VIGILANCE-VUL-29259.

Description of the vulnerability

An attacker can force the usage of a freed memory area via rds_tcp_kill_sock() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about SLES: