VYPR

rpm package

suse/kernel-syms-rt&distro=SUSE Linux Enterprise Real Time 12 SP5

pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5

Vulnerabilities (1,429)

  • CVE-2020-12656May 5, 2020
    affected < 4.12.14-10.13.1fixed 4.12.14-10.13.1

    gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not al

  • CVE-2020-12655May 5, 2020
    affected < 4.12.14-10.13.1fixed 4.12.14-10.13.1

    An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.

  • CVE-2020-12654May 5, 2020
    affected < 4.12.14-10.13.1fixed 4.12.14-10.13.1

    An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.

  • CVE-2020-12653May 5, 2020
    affected < 4.12.14-10.13.1fixed 4.12.14-10.13.1

    An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.

  • CVE-2020-12652May 5, 2020
    affected < 4.12.14-10.13.1fixed 4.12.14-10.13.1

    The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor stat

  • CVE-2020-12114May 4, 2020
    affected < 4.12.14-10.13.1fixed 4.12.14-10.13.1

    A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.

  • CVE-2020-12464Apr 29, 2020
    affected < 4.12.14-10.13.1fixed 4.12.14-10.13.1

    usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.

  • CVE-2020-11669Apr 10, 2020
    affected < 4.12.14-10.13.1fixed 4.12.14-10.13.1

    An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.

  • CVE-2020-8834Apr 9, 2020
    affected < 4.12.14-10.8.1fixed 4.12.14-10.8.1

    KVM in the Linux kernel on Power8 processors has a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc_{save,restore}_tm, leading to a stack corruption. Because of this, an attacker with the ability run code in kernel space of a guest VM can caus

  • CVE-2020-2732Apr 8, 2020
    affected < 4.12.14-10.5.1fixed 4.12.14-10.5.1

    A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 g

  • CVE-2020-11494Apr 2, 2020
    affected < 4.12.14-10.8.1fixed 4.12.14-10.8.1

    An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL

  • CVE-2020-10942Mar 24, 2020
    affected < 4.12.14-10.8.1fixed 4.12.14-10.8.1

    In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.

  • CVE-2020-9383Feb 25, 2020
    affected < 4.12.14-10.8.1fixed 4.12.14-10.8.1

    An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.

  • CVE-2020-8992Feb 14, 2020
    affected < 4.12.14-10.5.1fixed 4.12.14-10.5.1

    ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.

  • CVE-2020-8647Feb 6, 2020
    affected < 4.12.14-10.8.1fixed 4.12.14-10.8.1

    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.

  • CVE-2020-8648Feb 6, 2020
    affected < 4.12.14-10.5.1fixed 4.12.14-10.5.1

    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.

  • CVE-2020-8649Feb 6, 2020
    affected < 4.12.14-10.8.1fixed 4.12.14-10.8.1

    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.

  • CVE-2019-15126Feb 5, 2020
    affected < 4.12.14-10.73.1fixed 4.12.14-10.73.1

    An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure ov

  • CVE-2020-8428Jan 28, 2020
    affected < 4.12.14-10.5.1fixed 4.12.14-10.5.1

    fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a

  • CVE-2019-14615Jan 17, 2020
    affected < 4.12.14-6.3.1fixed 4.12.14-6.3.1

    Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.