rpm package
suse/kernel-docs&distro=SUSE Linux Enterprise Module for Development Tools 15 SP2
pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2
Vulnerabilities (194)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-27777 | — | < 5.3.18-24.43.2 | 5.3.18-24.43.2 | Dec 15, 2020 | A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase | ||
| CVE-2020-29568 | — | < 5.3.18-24.49.3 | 5.3.18-24.49.3 | Dec 15, 2020 | An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be ab | ||
| CVE-2020-27068 | — | < 5.3.18-24.46.1 | 5.3.18-24.46.1 | Dec 15, 2020 | Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel | ||
| CVE-2020-0465 | — | < 5.3.18-24.46.1 | 5.3.18-24.46.1 | Dec 14, 2020 | In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions | ||
| CVE-2020-0444 | — | < 5.3.18-24.46.1 | 5.3.18-24.46.1 | Dec 14, 2020 | In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVe | ||
| CVE-2020-0466 | — | < 5.3.18-24.46.1 | 5.3.18-24.46.1 | Dec 14, 2020 | In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersion | ||
| CVE-2020-27825 | — | < 5.3.18-24.46.1 | 5.3.18-24.46.1 | Dec 11, 2020 | A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local at | ||
| CVE-2020-27786 | — | < 5.3.18-24.46.1 | 5.3.18-24.46.1 | Dec 11, 2020 | A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of ex | ||
| CVE-2020-29660 | — | < 5.3.18-24.46.1 | 5.3.18-24.46.1 | Dec 9, 2020 | A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24. | ||
| CVE-2020-29661 | — | < 5.3.18-24.46.1 | 5.3.18-24.46.1 | Dec 9, 2020 | A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b. | ||
| CVE-2020-14351 | — | < 5.3.18-24.34.1 | 5.3.18-24.34.1 | Dec 3, 2020 | A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidenti | ||
| CVE-2020-25704 | — | < 5.3.18-24.43.2 | 5.3.18-24.43.2 | Dec 2, 2020 | A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service. | ||
| CVE-2020-25656 | — | < 5.3.18-24.37.1 | 5.3.18-24.37.1 | Dec 2, 2020 | A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidential | ||
| CVE-2020-29368 | — | < 5.3.18-24.52.1 | 5.3.18-24.52.1 | Nov 28, 2020 | An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1. | ||
| CVE-2020-29369 | — | < 5.3.18-24.43.2 | 5.3.18-24.43.2 | Nov 28, 2020 | An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe. | ||
| CVE-2020-29370 | — | < 5.3.18-24.46.1 | 5.3.18-24.46.1 | Nov 28, 2020 | An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71. | ||
| CVE-2020-29371 | — | < 5.3.18-24.43.2 | 5.3.18-24.43.2 | Nov 28, 2020 | An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd. | ||
| CVE-2020-29373 | — | < 5.3.18-24.46.1 | 5.3.18-24.46.1 | Nov 28, 2020 | An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d. | ||
| CVE-2020-29374 | — | < 5.3.18-24.52.1 | 5.3.18-24.52.1 | Nov 28, 2020 | An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended writ | ||
| CVE-2020-15437 | — | < 5.3.18-24.43.2 | 5.3.18-24.43.2 | Nov 23, 2020 | The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized. |
- CVE-2020-27777Dec 15, 2020affected < 5.3.18-24.43.2fixed 5.3.18-24.43.2
A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase
- CVE-2020-29568Dec 15, 2020affected < 5.3.18-24.49.3fixed 5.3.18-24.49.3
An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be ab
- CVE-2020-27068Dec 15, 2020affected < 5.3.18-24.46.1fixed 5.3.18-24.46.1
Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel
- CVE-2020-0465Dec 14, 2020affected < 5.3.18-24.46.1fixed 5.3.18-24.46.1
In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions
- CVE-2020-0444Dec 14, 2020affected < 5.3.18-24.46.1fixed 5.3.18-24.46.1
In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVe
- CVE-2020-0466Dec 14, 2020affected < 5.3.18-24.46.1fixed 5.3.18-24.46.1
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersion
- CVE-2020-27825Dec 11, 2020affected < 5.3.18-24.46.1fixed 5.3.18-24.46.1
A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local at
- CVE-2020-27786Dec 11, 2020affected < 5.3.18-24.46.1fixed 5.3.18-24.46.1
A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of ex
- CVE-2020-29660Dec 9, 2020affected < 5.3.18-24.46.1fixed 5.3.18-24.46.1
A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.
- CVE-2020-29661Dec 9, 2020affected < 5.3.18-24.46.1fixed 5.3.18-24.46.1
A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
- CVE-2020-14351Dec 3, 2020affected < 5.3.18-24.34.1fixed 5.3.18-24.34.1
A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidenti
- CVE-2020-25704Dec 2, 2020affected < 5.3.18-24.43.2fixed 5.3.18-24.43.2
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
- CVE-2020-25656Dec 2, 2020affected < 5.3.18-24.37.1fixed 5.3.18-24.37.1
A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidential
- CVE-2020-29368Nov 28, 2020affected < 5.3.18-24.52.1fixed 5.3.18-24.52.1
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
- CVE-2020-29369Nov 28, 2020affected < 5.3.18-24.43.2fixed 5.3.18-24.43.2
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
- CVE-2020-29370Nov 28, 2020affected < 5.3.18-24.46.1fixed 5.3.18-24.46.1
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
- CVE-2020-29371Nov 28, 2020affected < 5.3.18-24.43.2fixed 5.3.18-24.43.2
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.
- CVE-2020-29373Nov 28, 2020affected < 5.3.18-24.46.1fixed 5.3.18-24.46.1
An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.
- CVE-2020-29374Nov 28, 2020affected < 5.3.18-24.52.1fixed 5.3.18-24.52.1
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended writ
- CVE-2020-15437Nov 23, 2020affected < 5.3.18-24.43.2fixed 5.3.18-24.43.2
The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.
Page 7 of 10