The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Slackware

Linux kernel: out-of-bounds memory reading via ppp_cp_parse_cr
An attacker can force a read at an invalid address via ppp_cp_parse_cr() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
CERTFR-2020-AVI-642, CERTFR-2020-AVI-654, CERTFR-2020-AVI-668, CERTFR-2020-AVI-672, CVE-2020-25643, DSA-4774-1, openSUSE-SU-2020:1655-1, openSUSE-SU-2020:1698-1, RHBUG-1879981, SSA:2020-295-01, SUSE-SU-2020:2904-1, SUSE-SU-2020:2905-1, SUSE-SU-2020:2906-1, SUSE-SU-2020:2907-1, SUSE-SU-2020:2980-1, SUSE-SU-2020:2999-1, SUSE-SU-2020:3014-1, VIGILANCE-VUL-33497
Linux kernel: NULL pointer dereference via mm/hugetlb.c
An attacker can force a NULL pointer to be dereferenced via mm/hugetlb.c of the Linux kernel, in order to trigger a denial of service...
CERTFR-2020-AVI-614, CERTFR-2020-AVI-637, CVE-2020-25285, DLA-2385-1, SSA:2020-295-01, USN-4576-1, USN-4579-1, VIGILANCE-VUL-33316
Linux kernel: denial of service via do_split
An attacker can trigger a fatal error via do_split() of the Linux kernel, in order to trigger a denial of service...
1173798, CERTFR-2020-AVI-547, CERTFR-2020-AVI-548, CERTFR-2020-AVI-553, CERTFR-2020-AVI-568, CERTFR-2020-AVI-574, CERTFR-2020-AVI-614, CERTFR-2020-AVI-637, CVE-2020-14314, DLA-2385-1, openSUSE-SU-2020:1325-1, openSUSE-SU-2020:1382-1, SSA:2020-295-01, SUSE-SU-2020:2485-1, SUSE-SU-2020:2486-1, SUSE-SU-2020:2540-1, SUSE-SU-2020:2541-1, SUSE-SU-2020:2574-1, SUSE-SU-2020:2575-1, SUSE-SU-2020:2576-1, SUSE-SU-2020:2582-1, SUSE-SU-2020:2605-1, SUSE-SU-2020:2610-1, SUSE-SU-2020:2623-1, SUSE-SU-2020:2631-1, USN-4576-1, USN-4578-1, USN-4579-1, VIGILANCE-VUL-33234
ISC BIND: privilege escalation via Update-policy Rules
An attacker can bypass restrictions via Update-policy Rules of ISC BIND, in order to escalate his privileges...
6350241, CERTFR-2020-AVI-523, CVE-2020-8624, DSA-4752-1, K91090139, openSUSE-SU-2020:1699-1, openSUSE-SU-2020:1701-1, SSA:2020-234-01, SUSE-SU-2020:2914-1, Synology-SA-20:19, USN-4468-1, USN-4468-2, VIGILANCE-VUL-33130
cURL: information disclosure via CURLOPT_CONNECT_ONLY
An attacker can bypass access restrictions to data via CURLOPT_CONNECT_ONLY of cURL, in order to obtain sensitive information...
CVE-2020-8231, DLA-2382-1, FEDORA-2020-126a0dd319, FEDORA-2020-da832cb434, openSUSE-SU-2020:1345-1, openSUSE-SU-2020:1359-1, openSUSE-SU-2020:1494-1, SSA:2020-232-01, SUSE-SU-2020:14481-1, SUSE-SU-2020:2444-1, SUSE-SU-2020:2445-1, SUSE-SU-2020:2446-1, USN-4466-1, USN-4466-2, VIGILANCE-VUL-33107
Linux kernel: information disclosure via random32
An attacker can bypass access restrictions to data via random32 of the Linux kernel, in order to obtain sensitive information...
CERTFR-2020-AVI-547, CERTFR-2020-AVI-548, CERTFR-2020-AVI-553, CERTFR-2020-AVI-568, CERTFR-2020-AVI-574, CERTFR-2020-AVI-585, CERTFR-2020-AVI-614, CVE-2020-16166, DLA-2385-1, FEDORA-2020-2cd6393548, FEDORA-2020-8d634e31c0, openSUSE-SU-2020:1153-1, openSUSE-SU-2020:1236-1, RHSA-2020:4279-01, SSA:2020-295-01, SUSE-SU-2020:2485-1, SUSE-SU-2020:2486-1, SUSE-SU-2020:2540-1, SUSE-SU-2020:2541-1, SUSE-SU-2020:2574-1, SUSE-SU-2020:2575-1, SUSE-SU-2020:2576-1, SUSE-SU-2020:2582-1, SUSE-SU-2020:2605-1, SUSE-SU-2020:2610-1, SUSE-SU-2020:2623-1, SUSE-SU-2020:2631-1, USN-4525-1, USN-4526-1, VIGILANCE-VUL-32981
WebRTC: information disclosure via Internal Address Leak
An attacker can bypass access restrictions to data via Internal Address Leak of WebRTC, in order to obtain sensitive information...
ADV200002, bulletinjul2020, CVE-2020-6514, DLA-2297-1, DLA-2310-1, DSA-4736-1, DSA-4740-1, FEDORA-2020-84d87cbd50, FEDORA-2020-bf684961d9, MFSA2020-30, MFSA2020-31, MFSA2020-32, openSUSE-SU-2020:1020-1, openSUSE-SU-2020:1021-1, openSUSE-SU-2020:1048-1, openSUSE-SU-2020:1061-1, openSUSE-SU-2020:1147-1, openSUSE-SU-2020:1148-1, openSUSE-SU-2020:1155-1, openSUSE-SU-2020:1172-1, openSUSE-SU-2020:1179-1, openSUSE-SU-2020:1189-1, openSUSE-SU-2020:1205-1, RHSA-2020:3229-01, RHSA-2020:3233-01, RHSA-2020:3241-01, RHSA-2020:3253-01, RHSA-2020:3254-01, RHSA-2020:3341-01, RHSA-2020:3342-01, RHSA-2020:3343-01, RHSA-2020:3344-01, RHSA-2020:3345-01, RHSA-2020:3377-01, SSA:2020-209-01, SSA:2020-213-01, SUSE-SU-2020:14456-1, SUSE-SU-2020:2100-1, SUSE-SU-2020:2118-1, SUSE-SU-2020:2147-1, SUSE-SU-2020:2179-1, USN-4443-1, VIGILANCE-VUL-32960
ANGLE: use after free via gl-Texture-onUnbindAsSamplerTexture
An attacker can force the usage of a freed memory area via gl::Texture::onUnbindAsSamplerTexture() of ANGLE, in order to trigger a denial of service, and possibly to run code...
ADV200002, bulletinjul2020, CVE-2020-6463, DLA-2297-1, DLA-2310-1, DSA-4714-1, DSA-4714-2, DSA-4714-3, DSA-4736-1, DSA-4740-1, FEDORA-2020-0e7f1b663b, FEDORA-2020-da49fbb17c, MFSA2020-30, MFSA2020-31, MFSA2020-32, openSUSE-SU-2020:0604-1, openSUSE-SU-2020:0615-1, openSUSE-SU-2020:0635-1, openSUSE-SU-2020:0823-1, openSUSE-SU-2020:1147-1, openSUSE-SU-2020:1155-1, openSUSE-SU-2020:1179-1, openSUSE-SU-2020:1189-1, openSUSE-SU-2020:1205-1, RHSA-2020:1970-01, RHSA-2020:3229-01, RHSA-2020:3233-01, RHSA-2020:3241-01, RHSA-2020:3253-01, RHSA-2020:3254-01, RHSA-2020:3341-01, RHSA-2020:3342-01, RHSA-2020:3343-01, RHSA-2020:3344-01, RHSA-2020:3345-01, SSA:2020-209-01, SSA:2020-213-01, SUSE-SU-2020:14456-1, SUSE-SU-2020:2100-1, SUSE-SU-2020:2118-1, SUSE-SU-2020:2147-1, SUSE-SU-2020:2179-1, USN-4443-1, VIGILANCE-VUL-32959
Linux kernel: buffer overflow via vgacon_scrollback_update
An attacker can trigger a buffer overflow via vgacon_scrollback_update() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2020-AVI-483, CERTFR-2020-AVI-547, CERTFR-2020-AVI-548, CERTFR-2020-AVI-553, CERTFR-2020-AVI-568, CERTFR-2020-AVI-574, CERTFR-2020-AVI-614, CERTFR-2020-AVI-655, CVE-2020-14331, DLA-2385-1, openSUSE-SU-2020:1153-1, openSUSE-SU-2020:1236-1, openSUSE-SU-2020:1325-1, RHSA-2020:4286-01, RHSA-2020:4289-01, SSA:2020-295-01, SUSE-SU-2020:2102-1, SUSE-SU-2020:2119-1, SUSE-SU-2020:2122-1, SUSE-SU-2020:2485-1, SUSE-SU-2020:2486-1, SUSE-SU-2020:2540-1, SUSE-SU-2020:2541-1, SUSE-SU-2020:2574-1, SUSE-SU-2020:2575-1, SUSE-SU-2020:2576-1, SUSE-SU-2020:2582-1, SUSE-SU-2020:2605-1, SUSE-SU-2020:2610-1, SUSE-SU-2020:2623-1, SUSE-SU-2020:2631-1, VIGILANCE-VUL-32928
Linux kernel: memory leak via usbtest_disconnect
An attacker can create a memory leak via usbtest_disconnect() of the Linux kernel, in order to trigger a denial of service...
CERTFR-2020-AVI-462, CERTFR-2020-AVI-483, CERTFR-2020-AVI-504, CERTFR-2020-AVI-513, CERTFR-2020-AVI-522, CERTFR-2020-AVI-541, CERTFR-2020-AVI-547, CVE-2020-15393, DLA-2323-1, DLA-2324-1, openSUSE-SU-2020:1062-1, openSUSE-SU-2020:1153-1, SSA:2020-295-01, SUSE-SU-2020:2027-1, SUSE-SU-2020:2103-1, SUSE-SU-2020:2105-1, SUSE-SU-2020:2106-1, SUSE-SU-2020:2107-1, SUSE-SU-2020:2119-1, SUSE-SU-2020:2121-1, SUSE-SU-2020:2122-1, SUSE-SU-2020:2478-1, SUSE-SU-2020:2487-1, USN-4463-1, USN-4465-1, USN-4483-1, USN-4485-1, VIGILANCE-VUL-32648
Our database contains other pages. You can request a free trial to read them.

Display information about Slackware: