VYPR

rpm package

suse/kernel-syms&distro=SUSE Enterprise Storage 5

pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%205

Vulnerabilities (204)

  • CVE-2020-25669May 26, 2021
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.

  • CVE-2020-25668May 26, 2021
    affected < 4.4.180-94.135.1fixed 4.4.180-94.135.1

    A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.

  • CVE-2021-3347Jan 29, 2021
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.

  • CVE-2020-27835Jan 7, 2021
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.

  • CVE-2020-36158Jan 5, 2021
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.

  • CVE-2020-29569Dec 15, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly togg

  • CVE-2020-27777Dec 15, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase

  • CVE-2020-29568Dec 15, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be ab

  • CVE-2020-27068Dec 15, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel

  • CVE-2020-0465Dec 14, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions

  • CVE-2020-0444Dec 14, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVe

  • CVE-2020-0466Dec 14, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersion

  • CVE-2020-27825Dec 11, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local at

  • CVE-2020-27786Dec 11, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of ex

  • CVE-2020-29660Dec 9, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.

  • CVE-2020-29661Dec 9, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.

  • CVE-2020-14351Dec 3, 2020
    affected < 4.4.180-94.135.1fixed 4.4.180-94.135.1

    A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidenti

  • CVE-2020-14381Dec 3, 2020
    affected < 4.4.180-94.135.1fixed 4.4.180-94.135.1

    A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiali

  • CVE-2020-25656Dec 2, 2020
    affected < 4.4.180-94.135.1fixed 4.4.180-94.135.1

    A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidential

  • CVE-2019-20934Nov 28, 2020
    affected < 4.4.180-94.138.1fixed 4.4.180-94.138.1

    An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.

Page 1 of 11