VYPR

rpm package

suse/kernel-syms&distro=SUSE Linux Enterprise High Performance Computing 15-LTSS

pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSS

Vulnerabilities (387)

  • CVE-2020-29660Dec 9, 2020
    affected < 4.12.14-150.66.1fixed 4.12.14-150.66.1

    A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.

  • CVE-2020-29661Dec 9, 2020
    affected < 4.12.14-150.66.1fixed 4.12.14-150.66.1

    A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.

  • CVE-2020-14351Dec 3, 2020
    affected < 4.12.14-150.63.1fixed 4.12.14-150.63.1

    A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidenti

  • CVE-2020-14381Dec 3, 2020
    affected < 4.12.14-150.63.1fixed 4.12.14-150.63.1

    A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiali

  • CVE-2020-25704Dec 2, 2020
    affected < 4.12.14-150.63.1fixed 4.12.14-150.63.1

    A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.

  • CVE-2020-25656Dec 2, 2020
    affected < 4.12.14-150.63.1fixed 4.12.14-150.63.1

    A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidential

  • CVE-2019-20934Nov 28, 2020
    affected < 4.12.14-150.66.1fixed 4.12.14-150.66.1

    An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.

  • CVE-2020-29368Nov 28, 2020
    affected < 4.12.14-150.69.1fixed 4.12.14-150.69.1

    An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.

  • CVE-2020-29371Nov 28, 2020
    affected < 4.12.14-150.66.1fixed 4.12.14-150.66.1

    An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.

  • CVE-2020-29374Nov 28, 2020
    affected < 4.12.14-150.69.1fixed 4.12.14-150.69.1

    An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended writ

  • CVE-2020-15437Nov 23, 2020
    affected < 4.12.14-150.66.1fixed 4.12.14-150.66.1

    The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.

  • CVE-2020-15436Nov 23, 2020
    affected < 4.12.14-150.66.1fixed 4.12.14-150.66.1

    Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.

  • CVE-2020-12352Nov 23, 2020
    affected < 4.12.14-150.63.1fixed 4.12.14-150.63.1

    Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.

  • CVE-2020-12351Nov 23, 2020
    affected < 4.12.14-150.63.1fixed 4.12.14-150.63.1

    Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

  • CVE-2020-28974Nov 20, 2020
    affected < 4.12.14-150.66.1fixed 4.12.14-150.66.1

    A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such

  • CVE-2020-4788Nov 20, 2020
    affected < 4.12.14-150.66.1fixed 4.12.14-150.66.1

    IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.

  • CVE-2020-28915Nov 18, 2020
    affected < 4.12.14-150.66.1fixed 4.12.14-150.66.1

    A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.

  • CVE-2020-25705Nov 17, 2020
    affected < 4.12.14-150.63.1fixed 4.12.14-150.63.1

    A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well

  • CVE-2020-8694Nov 12, 2020
    affected < 4.12.14-150.63.1fixed 4.12.14-150.63.1

    Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-27673Oct 22, 2020
    affected < 4.12.14-150.63.1fixed 4.12.14-150.63.1

    An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.

Page 14 of 20