VYPR

rpm package

suse/kernel-source&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP4

pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4

Vulnerabilities (572)

  • CVE-2020-14351Dec 3, 2020
    affected < 4.12.14-95.65.1fixed 4.12.14-95.65.1

    A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidenti

  • CVE-2020-14381Dec 3, 2020
    affected < 4.12.14-95.65.1fixed 4.12.14-95.65.1

    A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiali

  • CVE-2020-25704Dec 2, 2020
    affected < 4.12.14-95.65.1fixed 4.12.14-95.65.1

    A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.

  • CVE-2020-25656Dec 2, 2020
    affected < 4.12.14-95.65.1fixed 4.12.14-95.65.1

    A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidential

  • CVE-2019-20934Nov 28, 2020
    affected < 4.12.14-95.68.1fixed 4.12.14-95.68.1

    An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.

  • CVE-2020-29368Nov 28, 2020
    affected < 4.12.14-95.71.1fixed 4.12.14-95.71.1

    An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.

  • CVE-2020-29371Nov 28, 2020
    affected < 4.12.14-95.68.1fixed 4.12.14-95.68.1

    An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.

  • CVE-2020-29374Nov 28, 2020
    affected < 4.12.14-95.71.1fixed 4.12.14-95.71.1

    An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended writ

  • CVE-2020-15437Nov 23, 2020
    affected < 4.12.14-95.68.1fixed 4.12.14-95.68.1

    The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.

  • CVE-2020-15436Nov 23, 2020
    affected < 4.12.14-95.68.1fixed 4.12.14-95.68.1

    Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.

  • CVE-2020-12352Nov 23, 2020
    affected < 4.12.14-95.65.1fixed 4.12.14-95.65.1

    Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.

  • CVE-2020-12351Nov 23, 2020
    affected < 4.12.14-95.65.1fixed 4.12.14-95.65.1

    Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

  • CVE-2020-28974Nov 20, 2020
    affected < 4.12.14-95.68.1fixed 4.12.14-95.68.1

    A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such

  • CVE-2020-4788Nov 20, 2020
    affected < 4.12.14-95.68.1fixed 4.12.14-95.68.1

    IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.

  • CVE-2020-28915Nov 18, 2020
    affected < 4.12.14-95.68.1fixed 4.12.14-95.68.1

    A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.

  • CVE-2020-25705Nov 17, 2020
    affected < 4.12.14-95.65.1fixed 4.12.14-95.65.1

    A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well

  • CVE-2020-8694Nov 12, 2020
    affected < 4.12.14-95.65.1fixed 4.12.14-95.65.1

    Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-27673Oct 22, 2020
    affected < 4.12.14-95.65.1fixed 4.12.14-95.65.1

    An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.

  • CVE-2020-27675Oct 22, 2020
    affected < 4.12.14-95.65.1fixed 4.12.14-95.65.1

    An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrate

  • CVE-2020-25645Oct 13, 2020
    affected < 4.12.14-95.65.1fixed 4.12.14-95.65.1

    A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic u

Page 15 of 29