Known Vulnerabilities for Leap by Opensuse

Listed below are 10 of the newest known vulnerabilities associated with the software "Leap" by "Opensuse".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-26676 gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing furthe... 6.5 - MEDIUM 2021-02-09 2021-05-05
CVE-2021-26675 A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code. 8.8 - HIGH 2021-02-09 2021-05-05
CVE-2021-25317 A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Mana... 4 - MEDIUM 2021-05-05 2021-05-06
CVE-2020-8027 A Insecure Temporary File vulnerability in openldap2 of SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server fo... 7.3 - HIGH 2021-02-11 2021-03-23
CVE-2020-8026 A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Le... 8.4 - HIGH 2020-08-07 2021-03-23
CVE-2020-8025 A Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, S... 6.1 - MEDIUM 2020-08-07 2021-03-23
CVE-2020-8024 A Incorrect Default Permissions vulnerability in the packaging of hylafax+ of openSUSE Leap 15.2, openSUSE Leap 15.1, openSUS... 5.3 - MEDIUM 2020-06-29 2021-03-23
CVE-2020-8023 A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise... 7.7 - HIGH 2020-09-01 2021-03-23
CVE-2020-8019 A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of syslog-ng of SUSE Linux Enterprise Debuginfo 11-SP... 7.7 - HIGH 2020-06-29 2021-03-23
CVE-2020-8017 A Race Condition Enabling Link Following vulnerability in the cron job shipped with texlive-filesystem of SUSE Linux Enterpri... 6.2 - MEDIUM 2020-04-02 2021-03-23

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language

Popular searches for Leap

openSUSE Leap

openSUSE Leap Learn about the openSUSE - distributions and download them for free OpenSUSE Installation (computer programs) USB flash drive Download Upgrade Server (computing) Checksum Package manager Linux distribution Online and offline Metalink DVD Leap (computer worm) Software Mebibyte X86-64 Desktop computer Software repository ARM architecture Compact disc

The makers' choice for sysadmins, developers and desktop users.

The makers' choice for sysadmins, developers and desktop users. Discover Tumbleweed and get the newest Linux packages with our rolling release. Fast! Integrated! Stabilized! Tested!. Discover Leap 7 5 3 and get the most complete Linux distribution with openSUSE & $s latest regular-release version! OpenSUSE Linux Programmer User (computing) Linux distribution Package manager Desktop environment Software release life cycle Go (programming language) Operating system Desktop computer Rolling release Leap (computer worm) Computer hardware Computing platform Integrated development environment Software versioning Linux kernel Patch (computing) Whiskey Media

© 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license. and Source URL Uptime Status