The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of OpenBSD

OpenBSD: information disclosure via Mesa Drivers
A local attacker can read a memory fragment via Mesa Drivers of OpenBSD, in order to obtain sensitive information...
VIGILANCE-VUL-30940
OpenBSD: privilege escalation via ifioctl
An attacker can bypass restrictions via ifioctl of OpenBSD, in order to escalate his privileges...
VIGILANCE-VUL-30896
OpenBSD: NULL pointer dereference via net80211
An attacker can force a NULL pointer to be dereferenced via net80211 of OpenBSD, in order to trigger a denial of service...
VIGILANCE-VUL-30895
Intel Processors: information disclosure via SGX
An attacker can bypass access restrictions to data via SGX of Intel Processors, in order to obtain sensitive information...
CERTFR-2019-AVI-563, CVE-2019-0117, FEDORA-2019-1689d3fe07, FEDORA-2019-68d7f68507, FEDORA-2019-7a3fc17778, INTEL-SA-00219, VIGILANCE-VUL-30851
Intel Xeon Scalable Processor: denial of service via Voltage Modulation
An attacker can trigger a fatal error via Voltage Modulation of Intel Xeon Scalable Processor, in order to trigger a denial of service...
CERTFR-2019-AVI-563, CVE-2019-11139, DLA-2051-1, DSA-4565-1, DSA-4565-2, FreeBSD-SA-19:26.mcu, HPESBHF03969, INTEL-SA-00271, openSUSE-SU-2019:2504-1, openSUSE-SU-2019:2509-1, openSUSE-SU-2019:2527-1, openSUSE-SU-2019:2528-1, openSUSE-SU-2019:2620-1, openSUSE-SU-2019:2631-1, SUSE-SU-2019:14217-1, SUSE-SU-2019:14220-1, SUSE-SU-2019:2957-1, SUSE-SU-2019:2958-1, SUSE-SU-2019:2959-1, SUSE-SU-2019:2986-1, SUSE-SU-2019:2987-1, SUSE-SU-2019:2988-1, SUSE-SU-2019:3091-1, USN-4182-1, USN-4182-2, USN-4182-3, USN-4182-4, VIGILANCE-VUL-30849
Intel Processors: information disclosure via TSX Asynchronous Abort
An attacker can bypass access restrictions to data via TSX Asynchronous Abort of Intel Processors, in order to obtain sensitive information...
CERTFR-2019-AVI-554, CERTFR-2019-AVI-555, CERTFR-2019-AVI-558, CERTFR-2019-AVI-559, CERTFR-2019-AVI-560, CERTFR-2019-AVI-561, CERTFR-2019-AVI-563, CERTFR-2019-AVI-571, CERTFR-2019-AVI-575, CERTFR-2019-AVI-612, CERTFR-2019-AVI-635, CERTFR-2020-AVI-029, CTX263684, CVE-2019-11135, DLA-1989-1, DLA-1990-1, DLA-2051-1, DSA-4564-1, DSA-4565-1, DSA-4565-2, DSA-4602-1, FEDORA-2019-1689d3fe07, FEDORA-2019-68d7f68507, FEDORA-2019-7a3fc17778, FreeBSD-SA-19:26.mcu, HPESBHF03968, INTEL-SA-00270, openSUSE-SU-2019:2503-1, openSUSE-SU-2019:2504-1, openSUSE-SU-2019:2505-1, openSUSE-SU-2019:2506-1, openSUSE-SU-2019:2507-1, openSUSE-SU-2019:2509-1, openSUSE-SU-2019:2510-1, openSUSE-SU-2019:2527-1, openSUSE-SU-2019:2528-1, openSUSE-SU-2019:2620-1, openSUSE-SU-2019:2631-1, openSUSE-SU-2019:2710-1, RHSA-2019:3832-01, RHSA-2019:3833-01, RHSA-2019:3834-01, RHSA-2019:3835-01, RHSA-2019:3836-01, RHSA-2019:3837-01, RHSA-2019:3838-01, RHSA-2019:3839-01, RHSA-2019:3840-01, RHSA-2019:3841-01, RHSA-2019:3842-01, RHSA-2019:3843-01, RHSA-2019:3844-01, RHSA-2019:3936-01, RHSA-2020:0026-01, RHSA-2020:0028-01, SSA:2019-320-01, SUSE-SU-2019:14217-1, SUSE-SU-2019:14218-1, SUSE-SU-2019:14220-1, SUSE-SU-2019:2946-1, SUSE-SU-2019:2947-1, SUSE-SU-2019:2948-1, SUSE-SU-2019:2949-1, SUSE-SU-2019:2950-1, SUSE-SU-2019:2951-1, SUSE-SU-2019:2952-1, SUSE-SU-2019:2953-1, SUSE-SU-2019:2954-1, SUSE-SU-2019:2955-1, SUSE-SU-2019:2956-1, SUSE-SU-2019:2957-1, SUSE-SU-2019:2958-1, SUSE-SU-2019:2959-1, SUSE-SU-2019:2960-1, SUSE-SU-2019:2961-1, SUSE-SU-2019:2962-1, SUSE-SU-2019:2984-1, SUSE-SU-2019:2986-1, SUSE-SU-2019:2987-1, SUSE-SU-2019:2988-1, SUSE-SU-2019:3091-1, SUSE-SU-2019:3200-1, SUSE-SU-2019:3294-1, SUSE-SU-2019:3295-1, SUSE-SU-2019:3297-1, SUSE-SU-2019:3340-1, SUSE-SU-2019:3348-1, SUSE-SU-2020:0093-1, USN-4182-1, USN-4182-2, USN-4182-3, USN-4182-4, USN-4183-1, USN-4183-2, USN-4184-1, USN-4184-2, USN-4185-1, USN-4185-2, USN-4185-3, USN-4186-1, USN-4186-2, USN-4186-3, USN-4187-1, USN-4188-1, VIGILANCE-VUL-30847, VMSA-2019-0020, XSA-305
Intel Graphic Driver: denial of service via Userspace Write On Blitter Command Streamer
An attacker can trigger a fatal error via Userspace Write On Blitter Command Streamer of Intel Graphic Driver, in order to trigger a denial of service...
CERTFR-2019-AVI-555, CERTFR-2019-AVI-561, CERTFR-2019-AVI-564, CERTFR-2019-AVI-571, CERTFR-2019-AVI-575, CERTFR-2019-AVI-579, CERTFR-2019-AVI-612, CERTFR-2019-AVI-635, CERTFR-2020-AVI-029, CVE-2019-0155, DLA-1990-1, DSA-4564-1, FEDORA-2019-1689d3fe07, FEDORA-2019-68d7f68507, FEDORA-2019-7a3fc17778, openSUSE-SU-2019:2503-1, openSUSE-SU-2019:2507-1, RHSA-2019:3870-01, RHSA-2019:3871-01, RHSA-2019:3872-01, RHSA-2019:3873-01, RHSA-2019:3877-01, RHSA-2019:3878-01, RHSA-2019:3883-01, RHSA-2019:3887-01, RHSA-2019:3889-01, RHSA-2019:3908-01, SSA:2019-320-01, SUSE-SU-2019:2946-1, SUSE-SU-2019:2948-1, SUSE-SU-2019:2949-1, SUSE-SU-2019:2984-1, SUSE-SU-2019:3200-1, SUSE-SU-2019:3289-1, SUSE-SU-2019:3294-1, SUSE-SU-2019:3295-1, SUSE-SU-2020:0093-1, USN-4183-1, USN-4183-2, USN-4184-1, USN-4184-2, USN-4185-1, USN-4185-2, USN-4185-3, USN-4186-1, USN-4186-2, USN-4186-3, VIGILANCE-VUL-30845
Intel i915 Graphic Chipset: denial of service via MMIO Userspace Read
An attacker can trigger a fatal error via MMIO Userspace Read of Intel i915 Graphic Chipset, in order to trigger a denial of service...
CERTFR-2019-AVI-554, CERTFR-2019-AVI-555, CERTFR-2019-AVI-561, CERTFR-2019-AVI-563, CERTFR-2019-AVI-571, CERTFR-2019-AVI-575, CERTFR-2019-AVI-612, CERTFR-2019-AVI-635, CERTFR-2019-AVI-639, CERTFR-2019-AVI-652, CERTFR-2020-AVI-029, CVE-2019-0154, DLA-1989-1, DLA-1990-1, DSA-4564-1, FEDORA-2019-1689d3fe07, FEDORA-2019-68d7f68507, FEDORA-2019-7a3fc17778, INTEL-SA-00260, openSUSE-SU-2019:2503-1, openSUSE-SU-2019:2507-1, RHSA-2019:3832-01, RHSA-2019:3833-01, RHSA-2019:3834-01, RHSA-2019:3835-01, RHSA-2019:3836-01, RHSA-2019:3837-01, RHSA-2019:3838-01, RHSA-2019:3839-01, RHSA-2019:3840-01, RHSA-2019:3841-01, RHSA-2019:3844-01, SSA:2019-320-01, SUSE-SU-2019:2946-1, SUSE-SU-2019:2948-1, SUSE-SU-2019:2949-1, SUSE-SU-2019:2984-1, SUSE-SU-2019:3200-1, SUSE-SU-2019:3289-1, SUSE-SU-2019:3294-1, SUSE-SU-2019:3295-1, SUSE-SU-2019:3316-1, SUSE-SU-2019:3317-1, SUSE-SU-2019:3372-1, SUSE-SU-2020:0093-1, USN-4183-1, USN-4183-2, USN-4184-1, USN-4184-2, USN-4185-1, USN-4185-2, USN-4185-3, USN-4186-1, USN-4186-2, USN-4186-3, VIGILANCE-VUL-30844
Intel Processors: denial of service via Machine Check Error On Page Size Change
An attacker, inside a guest system, can trigger a fatal error via Machine Check Error On Page Size Change of Intel Processors, in order to trigger a denial of service on the host system...
CERTFR-2019-AVI-554, CERTFR-2019-AVI-555, CERTFR-2019-AVI-558, CERTFR-2019-AVI-559, CERTFR-2019-AVI-560, CERTFR-2019-AVI-561, CERTFR-2019-AVI-563, CERTFR-2019-AVI-571, CERTFR-2019-AVI-575, CERTFR-2019-AVI-635, CERTFR-2020-AVI-029, CTX263684, CVE-2018-12207, DLA-1990-1, DSA-4564-1, DSA-4566-1, DSA-4602-1, FEDORA-2019-1689d3fe07, FEDORA-2019-68d7f68507, FEDORA-2019-7a3fc17778, FreeBSD-SA-19:25.mcepsc, INTEL-SA-00210, K17269881, openSUSE-SU-2019:2503-1, openSUSE-SU-2019:2505-1, openSUSE-SU-2019:2506-1, openSUSE-SU-2019:2507-1, openSUSE-SU-2019:2510-1, openSUSE-SU-2019:2710-1, RHSA-2019:3832-01, RHSA-2019:3833-01, RHSA-2019:3834-01, RHSA-2019:3835-01, RHSA-2019:3836-01, RHSA-2019:3837-01, RHSA-2019:3838-01, RHSA-2019:3839-01, RHSA-2019:3840-01, RHSA-2019:3841-01, RHSA-2019:3842-01, RHSA-2019:3843-01, RHSA-2019:3844-01, RHSA-2019:3936-01, RHSA-2020:0026-01, RHSA-2020:0028-01, SUSE-SU-2019:14218-1, SUSE-SU-2019:2946-1, SUSE-SU-2019:2947-1, SUSE-SU-2019:2948-1, SUSE-SU-2019:2949-1, SUSE-SU-2019:2950-1, SUSE-SU-2019:2951-1, SUSE-SU-2019:2952-1, SUSE-SU-2019:2953-1, SUSE-SU-2019:2954-1, SUSE-SU-2019:2955-1, SUSE-SU-2019:2956-1, SUSE-SU-2019:2960-1, SUSE-SU-2019:2961-1, SUSE-SU-2019:2962-1, SUSE-SU-2019:2984-1, SUSE-SU-2019:3294-1, SUSE-SU-2019:3295-1, SUSE-SU-2019:3297-1, SUSE-SU-2019:3340-1, SUSE-SU-2019:3348-1, SUSE-SU-2020:0093-1, USN-4183-1, USN-4183-2, USN-4184-1, USN-4184-2, USN-4185-1, USN-4185-2, USN-4185-3, USN-4186-1, USN-4186-2, USN-4186-3, VIGILANCE-VUL-30843, VMSA-2019-0020, XSA-304
OpenBSD: denial of service via bgpd NextHop Change
An attacker can trigger a fatal error via bgpd NextHop Change of OpenBSD, in order to trigger a denial of service...
VIGILANCE-VUL-30753
Our database contains other pages. You can request a free trial to read them.

Display information about OpenBSD: