rpm package
opensuse/kernel-kvmsmall&distro=openSUSE Leap 15.3
pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.3
Vulnerabilities (340)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-38205 | — | < 5.3.18-59.24.1 | 5.3.18-59.24.1 | Aug 8, 2021 | drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer). | ||
| CVE-2021-38206 | — | < 5.3.18-59.24.1 | 5.3.18-59.24.1 | Aug 8, 2021 | The mac80211 subsystem in the Linux kernel before 5.12.13, when a device supporting only 5 GHz is used, allows attackers to cause a denial of service (NULL pointer dereference in the radiotap parser) by injecting a frame with 802.11a rates. | ||
| CVE-2021-38207 | — | < 5.3.18-59.24.1 | 5.3.18-59.24.1 | Aug 8, 2021 | drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes. | ||
| CVE-2021-38208 | — | < 5.3.18-150300.59.68.1 | 5.3.18-150300.59.68.1 | Aug 8, 2021 | net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call. | ||
| CVE-2021-38209 | — | < 5.3.18-59.24.1 | 5.3.18-59.24.1 | Aug 8, 2021 | net/netfilter/nf_conntrack_standalone.c in the Linux kernel before 5.12.2 allows observation of changes in any net namespace because these changes are leaked into all other net namespaces. This is related to the NF_SYSCTL_CT_MAX, NF_SYSCTL_CT_EXPECT_MAX, and NF_SYSCTL_CT_BUCKETS | ||
| CVE-2021-38166 | — | < 5.3.18-59.24.1 | 5.3.18-59.24.1 | Aug 7, 2021 | In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability. | ||
| CVE-2021-38160 | — | < 5.3.18-59.24.1 | 5.3.18-59.24.1 | Aug 7, 2021 | In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any ex | ||
| CVE-2021-3655 | — | < 5.3.18-59.34.1 | 5.3.18-59.34.1 | Aug 5, 2021 | A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory. | ||
| CVE-2021-3679 | — | < 5.3.18-59.24.1 | 5.3.18-59.24.1 | Aug 5, 2021 | A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causin | ||
| CVE-2021-34556 | — | < 5.3.18-59.24.1 | 5.3.18-59.24.1 | Aug 2, 2021 | In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack. | ||
| CVE-2021-35477 | — | < 5.3.18-59.24.1 | 5.3.18-59.24.1 | Aug 2, 2021 | In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an atta | ||
| CVE-2021-37576 | — | < 5.3.18-59.19.1 | 5.3.18-59.19.1 | Jul 26, 2021 | arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e. | ||
| CVE-2021-37159 | — | < 5.3.18-59.34.1 | 5.3.18-59.34.1 | Jul 21, 2021 | hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free. | ||
| CVE-2021-33909 | — | < 5.3.18-59.16.1 | 5.3.18-59.16.1 | Jul 20, 2021 | fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05. | ||
| CVE-2021-3612 | — | < 5.3.18-59.19.1 | 5.3.18-59.19.1 | Jul 9, 2021 | An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highe | ||
| CVE-2021-22555 | — | KEV | < 5.3.18-59.16.1 | 5.3.18-59.16.1 | Jul 7, 2021 | A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space | |
| CVE-2021-35039 | — | < 5.3.18-59.19.1 | 5.3.18-59.19.1 | Jul 7, 2021 | kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument. | ||
| CVE-2020-28097 | — | < 5.3.18-150300.59.49.1 | 5.3.18-150300.59.49.1 | Jun 24, 2021 | The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85. | ||
| CVE-2021-33624 | — | < 5.3.18-59.13.1 | 5.3.18-59.13.1 | Jun 23, 2021 | In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db. | ||
| CVE-2021-0605 | — | < 5.3.18-59.13.1 | 5.3.18-59.13.1 | Jun 22, 2021 | In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Androi |
- CVE-2021-38205Aug 8, 2021affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1
drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).
- CVE-2021-38206Aug 8, 2021affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1
The mac80211 subsystem in the Linux kernel before 5.12.13, when a device supporting only 5 GHz is used, allows attackers to cause a denial of service (NULL pointer dereference in the radiotap parser) by injecting a frame with 802.11a rates.
- CVE-2021-38207Aug 8, 2021affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1
drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.
- CVE-2021-38208Aug 8, 2021affected < 5.3.18-150300.59.68.1fixed 5.3.18-150300.59.68.1
net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.
- CVE-2021-38209Aug 8, 2021affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1
net/netfilter/nf_conntrack_standalone.c in the Linux kernel before 5.12.2 allows observation of changes in any net namespace because these changes are leaked into all other net namespaces. This is related to the NF_SYSCTL_CT_MAX, NF_SYSCTL_CT_EXPECT_MAX, and NF_SYSCTL_CT_BUCKETS
- CVE-2021-38166Aug 7, 2021affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1
In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.
- CVE-2021-38160Aug 7, 2021affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1
In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any ex
- CVE-2021-3655Aug 5, 2021affected < 5.3.18-59.34.1fixed 5.3.18-59.34.1
A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
- CVE-2021-3679Aug 5, 2021affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1
A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causin
- CVE-2021-34556Aug 2, 2021affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1
In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.
- CVE-2021-35477Aug 2, 2021affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1
In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an atta
- CVE-2021-37576Jul 26, 2021affected < 5.3.18-59.19.1fixed 5.3.18-59.19.1
arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.
- CVE-2021-37159Jul 21, 2021affected < 5.3.18-59.34.1fixed 5.3.18-59.34.1
hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.
- CVE-2021-33909Jul 20, 2021affected < 5.3.18-59.16.1fixed 5.3.18-59.16.1
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
- CVE-2021-3612Jul 9, 2021affected < 5.3.18-59.19.1fixed 5.3.18-59.19.1
An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highe
- affected < 5.3.18-59.16.1fixed 5.3.18-59.16.1
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
- CVE-2021-35039Jul 7, 2021affected < 5.3.18-59.19.1fixed 5.3.18-59.19.1
kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.
- CVE-2020-28097Jun 24, 2021affected < 5.3.18-150300.59.49.1fixed 5.3.18-150300.59.49.1
The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.
- CVE-2021-33624Jun 23, 2021affected < 5.3.18-59.13.1fixed 5.3.18-59.13.1
In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.
- CVE-2021-0605Jun 22, 2021affected < 5.3.18-59.13.1fixed 5.3.18-59.13.1
In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Androi
Page 13 of 17