[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2021:0434-1 -- SLES kernel-default, kernel-syms

ID: oval:org.secpod.oval:def:89002761Date: (C)2021-02-24   (M)2024-05-22
Class: PATCHFamily: unix




The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers via an I/O request . - CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel . - CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system . - CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter which could be triggered by a local attackers by injecting conntrack netlink configuration . - CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl . - CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen . - CVE-2020-29568: Fixed a denial of service issue, related to processing watch events . - CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry . - CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation . - CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c . - CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances . - CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service . - CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c . - CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services interface, affecting guests running on top of PowerVM or KVM hypervisors . - CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation . - CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls . - CVE-2020-29371: Fixed uninitialized memory leaks to userspace . - CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID . - CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP . - CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel . - CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory . - CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit . - CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service. - CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver . - CVE-2020-28374: Fixed a Linux SCSI target issue . - CVE-2019-20934: Fixed a use-after-free in show_numa_stats because NUMA fault statistics were inappropriately freed .

Platform:
SUSE Linux Enterprise Server 12 SP4
Product:
kernel-default
kernel-syms
Reference:
SUSE-SU-2021:0434-1
CVE-2019-20934
CVE-2020-0444
CVE-2020-0465
CVE-2020-0466
CVE-2020-15436
CVE-2020-15437
CVE-2020-25211
CVE-2020-25639
CVE-2020-25669
CVE-2020-27068
CVE-2020-27777
CVE-2020-27786
CVE-2020-27825
CVE-2020-27835
CVE-2020-28374
CVE-2020-28915
CVE-2020-28974
CVE-2020-29371
CVE-2020-29568
CVE-2020-29569
CVE-2020-29660
CVE-2020-29661
CVE-2020-36158
CVE-2020-4788
CVE-2021-3347
CVE-2021-3348
CVE    26
CVE-2020-29371
CVE-2021-3347
CVE-2021-3348
CVE-2020-0465
...

© SecPod Technologies