VYPR

rpm package

suse/kernel-source&distro=SUSE OpenStack Cloud 8

pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%208

Vulnerabilities (358)

  • CVE-2020-10766Sep 15, 2020
    affected < 4.4.180-94.124.1fixed 4.4.180-94.124.1

    A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This iss

  • CVE-2020-14331Sep 15, 2020
    affected < 4.4.180-94.130.1fixed 4.4.180-94.130.1

    A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA cons

  • CVE-2020-14314Sep 15, 2020
    affected < 4.4.180-94.130.1fixed 4.4.180-94.130.1

    A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerabi

  • CVE-2020-25284Sep 13, 2020
    affected < 4.4.180-94.135.1fixed 4.4.180-94.135.1

    The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.

  • CVE-2020-25285Sep 13, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.

  • CVE-2020-10773Sep 10, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    A stack information leak flaw was found in s390/s390x in the Linux kernel’s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.

  • CVE-2020-25212Sep 9, 2020
    affected < 4.4.180-94.135.1fixed 4.4.180-94.135.1

    A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.

  • CVE-2020-25211Sep 9, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef

  • CVE-2020-1749Sep 9, 2020
    affected < 4.4.180-94.144.1fixed 4.4.180-94.144.1

    A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending

  • CVE-2020-3702Sep 8, 2020
    affected < 4.4.180-94.150.1fixed 4.4.180-94.150.1

    u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapd

  • CVE-2020-10720Sep 3, 2020
    affected < 4.4.180-94.116.1fixed 4.4.180-94.116.1

    A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.

  • CVE-2020-16166Jul 30, 2020
    affected < 4.4.180-94.130.1fixed 4.4.180-94.130.1

    The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.

  • CVE-2020-0305Jul 17, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-15346

  • CVE-2019-19338Jul 13, 2020
    affected < 4.4.180-94.113.1fixed 4.4.180-94.113.1

    A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw

  • CVE-2020-10769Jun 26, 2020
    affected < 4.4.180-94.164.2fixed 4.4.180-94.164.2

    A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a

  • CVE-2020-14416Jun 18, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.

  • CVE-2020-0543Jun 15, 2020
    affected < 4.4.180-94.121.1fixed 4.4.180-94.121.1

    Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-10732Jun 12, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.

  • CVE-2020-10757Jun 9, 2020
    affected < 4.4.180-94.121.1fixed 4.4.180-94.121.1

    A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.

  • CVE-2020-13974Jun 9, 2020
    affected < 4.4.180-94.127.1fixed 4.4.180-94.127.1

    An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in

Page 10 of 18