The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. |
|
 |
|
|
Computer vulnerabilities of Kernel Linux
Linux kernel: NULL pointer dereference via serial8250_start_tx
An attacker can force a NULL pointer to be dereferenced via serial8250_start_tx() of the Linux kernel, in order to trigger a denial of service...
CERTFR-2020-AVI-794, CERTFR-2020-AVI-811, CERTFR-2020-AVI-837, CVE-2020-15437, openSUSE-SU-2020:2161-1, openSUSE-SU-2020:2193-1, openSUSE-SU-2020:2260-1, SUSE-SU-2020:3713-1, SUSE-SU-2020:3714-1, SUSE-SU-2020:3715-1, SUSE-SU-2020:3717-1, SUSE-SU-2020:3718-1, SUSE-SU-2020:3748-1, SUSE-SU-2020:3764-1, SUSE-SU-2020:3766-1, SUSE-SU-2020:3798-1, VIGILANCE-VUL-34040 |
IBM Power9 Processor: information disclosure via L1 Cache
An attacker can bypass access restrictions to data via L1 Cache of IBM Power9 Processor, in order to obtain sensitive information...
6370719, CERTFR-2020-AVI-786, CERTFR-2020-AVI-794, CERTFR-2020-AVI-811, CERTFR-2020-AVI-837, CERTFR-2021-AVI-006, CERTFR-2021-AVI-021, CERTFR-2021-AVI-035, CVE-2020-4788, FEDORA-2020-4700a73bd5, FEDORA-2020-8c15928d23, openSUSE-SU-2020:2161-1, openSUSE-SU-2020:2193-1, openSUSE-SU-2020:2260-1, openSUSE-SU-2021:0075-1, SUSE-SU-2020:3713-1, SUSE-SU-2020:3748-1, SUSE-SU-2020:3764-1, SUSE-SU-2020:3766-1, SUSE-SU-2020:3798-1, SUSE-SU-2021:0097-1, SUSE-SU-2021:0098-1, SUSE-SU-2021:0118-1, SUSE-SU-2021:0133-1, USN-4657-1, USN-4658-1, USN-4658-2, USN-4659-1, USN-4659-2, USN-4660-1, USN-4660-2, USN-4681-1, VIGILANCE-VUL-33943 |
Linux kernel: out-of-bounds memory reading via fbcon_get_font
An attacker can force a read at an invalid address via fbcon_get_font() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
1178886, CERTFR-2020-AVI-786, CERTFR-2020-AVI-794, CERTFR-2020-AVI-811, CERTFR-2020-AVI-837, CVE-2020-28915, openSUSE-SU-2020:2034-1, openSUSE-SU-2020:2161-1, openSUSE-SU-2020:2260-1, SUSE-SU-2020:3713-1, SUSE-SU-2020:3714-1, SUSE-SU-2020:3715-1, SUSE-SU-2020:3717-1, SUSE-SU-2020:3718-1, SUSE-SU-2020:3748-1, SUSE-SU-2020:3764-1, SUSE-SU-2020:3766-1, SUSE-SU-2020:3798-1, USN-4657-1, USN-4658-1, USN-4658-2, USN-4659-1, USN-4659-2, USN-4660-1, USN-4660-2, VIGILANCE-VUL-33932 |
Linux kernel: NULL pointer dereference via spk_ttyio_ldisc_close
An attacker can force a NULL pointer to be dereferenced via spk_ttyio_ldisc_close of the Linux kernel, in order to trigger a denial of service...
CERTFR-2020-AVI-794, CERTFR-2020-AVI-811, CVE-2020-28941, DLA-2483-1, FEDORA-2020-4700a73bd5, FEDORA-2020-8c15928d23, openSUSE-SU-2020:2161-1, openSUSE-SU-2020:2260-1, SUSE-SU-2020:3713-1, SUSE-SU-2020:3748-1, SUSE-SU-2020:3764-1, VIGILANCE-VUL-33931 |
DNS: Man-in-the-Middle via SAD DNS ICMP Rate
An attacker can act as a Man-in-the-Middle via ICMP Rate on DNS, in order to read or write data in the session...
CERTFR-2020-AVI-750, CERTFR-2020-AVI-764, CERTFR-2020-AVI-769, CERTFR-2020-AVI-776, CERTFR-2020-AVI-784, CERTFR-2020-AVI-786, CERTFR-2020-AVI-811, CERTFR-2020-AVI-834, CERTFR-2021-AVI-006, CVE-2020-25705, DLA-2483-1, DLA-2494-1, K09604370, openSUSE-SU-2020:2034-1, openSUSE-SU-2020:2112-1, openSUSE-SU-2020:2161-1, SAD DNS, SUSE-SU-2020:3326-1, SUSE-SU-2020:3484-1, SUSE-SU-2020:3491-1, SUSE-SU-2020:3501-1, SUSE-SU-2020:3503-1, SUSE-SU-2020:3507-1, SUSE-SU-2020:3512-1, SUSE-SU-2020:3513-1, SUSE-SU-2020:3522-1, SUSE-SU-2020:3532-1, SUSE-SU-2020:3544-1, SUSE-SU-2020:3717-1, SUSE-SU-2020:3764-1, USN-4657-1, USN-4658-1, USN-4658-2, USN-4659-1, USN-4659-2, USN-4680-1, VIGILANCE-VUL-33901 |
Our database contains other pages. You can request a free trial to read them.
Display information about Kernel Linux:
|