rpm package
suse/sca-patterns-sle11&distro=SUSE Linux Enterprise Module for Server Applications 15 SP3
pkg:rpm/suse/sca-patterns-sle11&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3
Vulnerabilities (7)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-24490 | — | < 1.5.1-150300.18.3.1 | 1.5.1-150300.18.3.1 | Feb 2, 2021 | Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ. | ||
| CVE-2020-12352 | — | < 1.5.1-150300.18.3.1 | 1.5.1-150300.18.3.1 | Nov 23, 2020 | Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access. | ||
| CVE-2020-12351 | — | < 1.5.1-150300.18.3.1 | 1.5.1-150300.18.3.1 | Nov 23, 2020 | Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. | ||
| CVE-2020-1472 | — | KEV | < 1.5.1-150300.18.3.1 | 1.5.1-150300.18.3.1 | Aug 17, 2020 | An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted | |
| CVE-2020-0543 | — | < 1.5.1-150300.18.3.1 | 1.5.1-150300.18.3.1 | Jun 15, 2020 | Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | ||
| CVE-2020-0549 | — | < 1.5.1-150300.18.3.1 | 1.5.1-150300.18.3.1 | Jan 28, 2020 | Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | ||
| CVE-2020-0548 | — | < 1.5.1-150300.18.3.1 | 1.5.1-150300.18.3.1 | Jan 28, 2020 | Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. |
- CVE-2020-24490Feb 2, 2021affected < 1.5.1-150300.18.3.1fixed 1.5.1-150300.18.3.1
Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
- CVE-2020-12352Nov 23, 2020affected < 1.5.1-150300.18.3.1fixed 1.5.1-150300.18.3.1
Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
- CVE-2020-12351Nov 23, 2020affected < 1.5.1-150300.18.3.1fixed 1.5.1-150300.18.3.1
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
- affected < 1.5.1-150300.18.3.1fixed 1.5.1-150300.18.3.1
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted
- CVE-2020-0543Jun 15, 2020affected < 1.5.1-150300.18.3.1fixed 1.5.1-150300.18.3.1
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2020-0549Jan 28, 2020affected < 1.5.1-150300.18.3.1fixed 1.5.1-150300.18.3.1
Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2020-0548Jan 28, 2020affected < 1.5.1-150300.18.3.1fixed 1.5.1-150300.18.3.1
Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.