VYPR

rpm package

suse/kernel-source&distro=SUSE Enterprise Storage 5

pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%205

Vulnerabilities (204)

  • CVE-2020-10766Sep 15, 2020
    affected < 4.4.180-94.124.1fixed 4.4.180-94.124.1

    A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This iss

  • CVE-2020-14331Sep 15, 2020
    affected < 4.4.180-94.130.1fixed 4.4.180-94.130.1

    A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA cons

  • CVE-2020-14314Sep 15, 2020
    affected < 4.4.180-94.130.1fixed 4.4.180-94.130.1

    A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerabi

  • CVE-2020-25284Sep 13, 2020
    affected < 4.4.180-94.135.1fixed 4.4.180-94.135.1

    The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.

  • CVE-2020-25285Sep 13, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.

  • CVE-2020-10773Sep 10, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    A stack information leak flaw was found in s390/s390x in the Linux kernel’s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.

  • CVE-2020-25212Sep 9, 2020
    affected < 4.4.180-94.135.1fixed 4.4.180-94.135.1

    A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.

  • CVE-2020-25211Sep 9, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef

  • CVE-2020-10720Sep 3, 2020
    affected < 4.4.180-94.116.1fixed 4.4.180-94.116.1

    A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.

  • CVE-2020-16166Jul 30, 2020
    affected < 4.4.180-94.130.1fixed 4.4.180-94.130.1

    The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.

  • CVE-2020-0305Jul 17, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-15346

  • CVE-2019-19338Jul 13, 2020
    affected < 4.4.180-94.113.1fixed 4.4.180-94.113.1

    A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw

  • CVE-2020-14416Jun 18, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.

  • CVE-2020-0543Jun 15, 2020
    affected < 4.4.180-94.121.1fixed 4.4.180-94.121.1

    Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-10732Jun 12, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.

  • CVE-2020-10757Jun 9, 2020
    affected < 4.4.180-94.121.1fixed 4.4.180-94.121.1

    A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.

  • CVE-2020-13974Jun 9, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in

  • CVE-2019-20812Jun 3, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.

  • CVE-2019-20810Jun 2, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.

  • CVE-2020-10751May 26, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest

Page 3 of 11