Slackware Linux update for kernel



| Updated: 2025-04-24
Risk Medium
Patch available YES
Number of vulnerabilities 19
CVE-ID CVE-2020-11668
CVE-2020-11608
CVE-2020-11609
CVE-2020-10942
CVE-2020-11494
CVE-2020-12826
CVE-2019-19319
CVE-2020-12464
CVE-2020-10751
CVE-2020-10711
CVE-2020-1749
CVE-2020-12769
CVE-2020-10690
CVE-2020-13143
CVE-2019-19768
CVE-2020-12770
CVE-2018-9517
CVE-2020-10732
CVE-2020-0543
CWE-ID CWE-476
CWE-121
CWE-200
CWE-190
CWE-125
CWE-416
CWE-264
CWE-319
CWE-20
CWE-908
Exploitation vector Network
Public exploit N/A
Vulnerable software
Slackware Linux
Operating systems & Components / Operating system

linux-4.4.227/kernel-headers
Operating systems & Components / Operating system package or component

linux-4.4.227/kernel-modules
Operating systems & Components / Operating system package or component

linux-4.4.227/kernel-huge
Operating systems & Components / Operating system package or component

linux-4.4.227/kernel-generic
Operating systems & Components / Operating system package or component

Vendor Slackware

Security Bulletin

This security bulletin contains information about 19 vulnerabilities.

1) NULL pointer dereference

EUVDB-ID: #VU27875

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-11668

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the drivers/media/usb/gspca/xirlink_cit.c in Xirlink camera USB driver. A local user can pass specially crafted data to the driver and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) NULL pointer dereference

EUVDB-ID: #VU28220

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-11608

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in "drivers/media/usb/gspca/ov519.c" file in "ov511_mode_init_regs and ov518_mode_init_regs". A remote authenticated attacker can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU28221

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-11609

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the stv06xx subsystem in the "drivers/media/usb/gspca/stv06xx/stv06xx.c" and "drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c" files. A remote authenticated attacker can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Stack-based buffer overflow

EUVDB-ID: #VU27309

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-10942

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the get_raw_socket() function in drivers/vhost/net.c due to lack of validation of the sk_family field. A local user can perform a specially crafted system call, trigger stack overflow and crash the kernel.


Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Information disclosure

EUVDB-ID: #VU28156

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-11494

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in "slc_bump" in "drivers/net/can/slcan.c" file. A local administrator can gain unauthorized access to sensitive information on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Integer overflow

EUVDB-ID: #VU28168

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-12826

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in "exec_id" in "include/linux/sched.h". A local user can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Out-of-bounds read

EUVDB-ID: #VU90370

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-19319

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local privileged user to execute arbitrary code.

The vulnerability exists due to an out-of-bounds read error within the __check_block_validity() function in fs/ext4/inode.c, within the debug_print_tree() and ext4_setup_system_zone() functions in fs/ext4/block_validity.c. A local privileged user can execute arbitrary code.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free

EUVDB-ID: #VU29958

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-12464

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the usb_sg_cancel() function in drivers/usb/core/message.c in the Linux kernel. A local user can trigger a use-after-free error during file transfer to USB driver and execute arbitrary code on the system with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU28290

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-10751

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due in the Linux kernels SELinux LSM hook implementation where the kernel incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) NULL pointer dereference

EUVDB-ID: #VU28180

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2020-10711

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the Linux kernel's SELinux subsystem when importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated.

A remote attacker can send specially crafted packets the affected system, trigger a NULL pointer dereference error and crash the Linux kernel.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Cleartext transmission of sensitive information

EUVDB-ID: #VU52058

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2020-1749

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to incorrect implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Input validation error

EUVDB-ID: #VU28171

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-12769

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the "drivers/spi/spi-dw.c" file. A local user can cause a panic via concurrent calls to "dw_spi_irq" and "dw_spi_transfer_one" and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Use-after-free

EUVDB-ID: #VU30292

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-10690

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local privileged user to execute arbitrary code.

There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Out-of-bounds read

EUVDB-ID: #VU28157

Risk: Medium

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2020-13143

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in "gadget_dev_desc_UDC_store" in "drivers/usb/gadget/configfs.c" file. A remote attacker can trigger out-of-bounds read error and cause a denial of service on the target system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Use-after-free

EUVDB-ID: #VU27503

Risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-19768

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in the __blk_add_trace() function in kernel/trace/blktrace.c. A local user can run a specially crafted program, trigger a use-after-free error and execute arbitrary code on the system with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Input validation error

EUVDB-ID: #VU28170

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-12770

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the system.

The vulnerability exists due to the "sg_write" lacks an "sg_remove_request" call in a certain failure case. A local user can pass specially crafted input to the application and execute arbitrary code on the target system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Use-after-free

EUVDB-ID: #VU19987

Risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-9517

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in pppol2tp_connect. A local user can trigger memory corruption and escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Use of uninitialized resource

EUVDB-ID: #VU92424

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-10732

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to read memory contents or crash the application.

The vulnerability exists due to use of uninitialized resource error within the fill_thread_core_info() function in fs/binfmt_elf.c. A local user can read memory contents or crash the application.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Information disclosure

EUVDB-ID: #VU28928

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-0543

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to incomplete cleanup from specific special register read operations in some Intel(R) Processors. A local user can gain unauthorized access to sensitive information on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 14.2

linux-4.4.227/kernel-headers: All versions

linux-4.4.227/kernel-modules: All versions

linux-4.4.227/kernel-huge: All versions

linux-4.4.227/kernel-generic: All versions

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.764890


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###