The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Kernel Linux

Linux kernel: denial of service via Iptables String Match
An attacker can trigger a fatal error via Iptables String Match of the Linux kernel, in order to trigger a denial of service...
209823, CVE-2021-20177, VIGILANCE-VUL-34274
AMD Processors: information disclosure via Running Average Power Limit
An attacker can bypass access restrictions to data via Running Average Power Limit of AMD Processors, in order to obtain sensitive information...
CERTFR-2021-AVI-006, CVE-2020-12912, USN-4678-1, VIGILANCE-VUL-34246
Linux kernel: information disclosure via collect_syscall
A local attacker can read a memory fragment via collect_syscall() of the Linux kernel, in order to obtain sensitive information...
CVE-2020-28588, TALOS-2020-1211, VIGILANCE-VUL-34090
Linux kernel: NULL pointer dereference via spk_ttyio_receive_buf2
An attacker can force a NULL pointer to be dereferenced via spk_ttyio_receive_buf2() of the Linux kernel, in order to trigger a denial of service...
CERTFR-2021-AVI-021, CERTFR-2021-AVI-035, CVE-2020-27830, SUSE-SU-2021:0096-1, SUSE-SU-2021:0108-1, SUSE-SU-2021:0117-1, VIGILANCE-VUL-34041
Linux kernel: NULL pointer dereference via serial8250_start_tx
An attacker can force a NULL pointer to be dereferenced via serial8250_start_tx() of the Linux kernel, in order to trigger a denial of service...
CERTFR-2020-AVI-794, CERTFR-2020-AVI-811, CERTFR-2020-AVI-837, CVE-2020-15437, openSUSE-SU-2020:2161-1, openSUSE-SU-2020:2193-1, openSUSE-SU-2020:2260-1, SUSE-SU-2020:3713-1, SUSE-SU-2020:3714-1, SUSE-SU-2020:3715-1, SUSE-SU-2020:3717-1, SUSE-SU-2020:3718-1, SUSE-SU-2020:3748-1, SUSE-SU-2020:3764-1, SUSE-SU-2020:3766-1, SUSE-SU-2020:3798-1, VIGILANCE-VUL-34040
Linux kernel: information disclosure via io_uring
An attacker can bypass access restrictions to data via io_uring of the Linux kernel, in order to obtain sensitive information...
CERTFR-2021-AVI-021, CERTFR-2021-AVI-035, CVE-2020-29373, PROJ-ZERO-2011, SUSE-SU-2021:0096-1, SUSE-SU-2021:0108-1, SUSE-SU-2021:0117-1, VIGILANCE-VUL-33996
IBM Power9 Processor: information disclosure via L1 Cache
An attacker can bypass access restrictions to data via L1 Cache of IBM Power9 Processor, in order to obtain sensitive information...
6370719, CERTFR-2020-AVI-786, CERTFR-2020-AVI-794, CERTFR-2020-AVI-811, CERTFR-2020-AVI-837, CERTFR-2021-AVI-006, CERTFR-2021-AVI-021, CERTFR-2021-AVI-035, CVE-2020-4788, FEDORA-2020-4700a73bd5, FEDORA-2020-8c15928d23, openSUSE-SU-2020:2161-1, openSUSE-SU-2020:2193-1, openSUSE-SU-2020:2260-1, openSUSE-SU-2021:0075-1, SUSE-SU-2020:3713-1, SUSE-SU-2020:3748-1, SUSE-SU-2020:3764-1, SUSE-SU-2020:3766-1, SUSE-SU-2020:3798-1, SUSE-SU-2021:0097-1, SUSE-SU-2021:0098-1, SUSE-SU-2021:0118-1, SUSE-SU-2021:0133-1, USN-4657-1, USN-4658-1, USN-4658-2, USN-4659-1, USN-4659-2, USN-4660-1, USN-4660-2, USN-4681-1, VIGILANCE-VUL-33943
Linux kernel: out-of-bounds memory reading via fbcon_get_font
An attacker can force a read at an invalid address via fbcon_get_font() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
1178886, CERTFR-2020-AVI-786, CERTFR-2020-AVI-794, CERTFR-2020-AVI-811, CERTFR-2020-AVI-837, CVE-2020-28915, openSUSE-SU-2020:2034-1, openSUSE-SU-2020:2161-1, openSUSE-SU-2020:2260-1, SUSE-SU-2020:3713-1, SUSE-SU-2020:3714-1, SUSE-SU-2020:3715-1, SUSE-SU-2020:3717-1, SUSE-SU-2020:3718-1, SUSE-SU-2020:3748-1, SUSE-SU-2020:3764-1, SUSE-SU-2020:3766-1, SUSE-SU-2020:3798-1, USN-4657-1, USN-4658-1, USN-4658-2, USN-4659-1, USN-4659-2, USN-4660-1, USN-4660-2, VIGILANCE-VUL-33932
Linux kernel: NULL pointer dereference via spk_ttyio_ldisc_close
An attacker can force a NULL pointer to be dereferenced via spk_ttyio_ldisc_close of the Linux kernel, in order to trigger a denial of service...
CERTFR-2020-AVI-794, CERTFR-2020-AVI-811, CVE-2020-28941, DLA-2483-1, FEDORA-2020-4700a73bd5, FEDORA-2020-8c15928d23, openSUSE-SU-2020:2161-1, openSUSE-SU-2020:2260-1, SUSE-SU-2020:3713-1, SUSE-SU-2020:3748-1, SUSE-SU-2020:3764-1, VIGILANCE-VUL-33931
DNS: Man-in-the-Middle via SAD DNS ICMP Rate
An attacker can act as a Man-in-the-Middle via ICMP Rate on DNS, in order to read or write data in the session...
CERTFR-2020-AVI-750, CERTFR-2020-AVI-764, CERTFR-2020-AVI-769, CERTFR-2020-AVI-776, CERTFR-2020-AVI-784, CERTFR-2020-AVI-786, CERTFR-2020-AVI-811, CERTFR-2020-AVI-834, CERTFR-2021-AVI-006, CVE-2020-25705, DLA-2483-1, DLA-2494-1, K09604370, openSUSE-SU-2020:2034-1, openSUSE-SU-2020:2112-1, openSUSE-SU-2020:2161-1, SAD DNS, SUSE-SU-2020:3326-1, SUSE-SU-2020:3484-1, SUSE-SU-2020:3491-1, SUSE-SU-2020:3501-1, SUSE-SU-2020:3503-1, SUSE-SU-2020:3507-1, SUSE-SU-2020:3512-1, SUSE-SU-2020:3513-1, SUSE-SU-2020:3522-1, SUSE-SU-2020:3532-1, SUSE-SU-2020:3544-1, SUSE-SU-2020:3717-1, SUSE-SU-2020:3764-1, USN-4657-1, USN-4658-1, USN-4658-2, USN-4659-1, USN-4659-2, USN-4680-1, VIGILANCE-VUL-33901
Our database contains other pages. You can request a free trial to read them.

Display information about Kernel Linux: