VYPR

rpm package

opensuse/kernel-kvmsmall&distro=openSUSE Leap 15.3

pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.3

Vulnerabilities (340)

  • CVE-2021-38205Aug 8, 2021
    affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1

    drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).

  • CVE-2021-38206Aug 8, 2021
    affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1

    The mac80211 subsystem in the Linux kernel before 5.12.13, when a device supporting only 5 GHz is used, allows attackers to cause a denial of service (NULL pointer dereference in the radiotap parser) by injecting a frame with 802.11a rates.

  • CVE-2021-38207Aug 8, 2021
    affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1

    drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.

  • CVE-2021-38208Aug 8, 2021
    affected < 5.3.18-150300.59.68.1fixed 5.3.18-150300.59.68.1

    net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.

  • CVE-2021-38209Aug 8, 2021
    affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1

    net/netfilter/nf_conntrack_standalone.c in the Linux kernel before 5.12.2 allows observation of changes in any net namespace because these changes are leaked into all other net namespaces. This is related to the NF_SYSCTL_CT_MAX, NF_SYSCTL_CT_EXPECT_MAX, and NF_SYSCTL_CT_BUCKETS

  • CVE-2021-38166Aug 7, 2021
    affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1

    In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.

  • CVE-2021-38160Aug 7, 2021
    affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1

    In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any ex

  • CVE-2021-3655Aug 5, 2021
    affected < 5.3.18-59.34.1fixed 5.3.18-59.34.1

    A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.

  • CVE-2021-3679Aug 5, 2021
    affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1

    A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causin

  • CVE-2021-34556Aug 2, 2021
    affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1

    In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

  • CVE-2021-35477Aug 2, 2021
    affected < 5.3.18-59.24.1fixed 5.3.18-59.24.1

    In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an atta

  • CVE-2021-37576Jul 26, 2021
    affected < 5.3.18-59.19.1fixed 5.3.18-59.19.1

    arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.

  • CVE-2021-37159Jul 21, 2021
    affected < 5.3.18-59.34.1fixed 5.3.18-59.34.1

    hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.

  • CVE-2021-33909Jul 20, 2021
    affected < 5.3.18-59.16.1fixed 5.3.18-59.16.1

    fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.

  • CVE-2021-3612Jul 9, 2021
    affected < 5.3.18-59.19.1fixed 5.3.18-59.19.1

    An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highe

  • CVE-2021-22555KEVJul 7, 2021
    affected < 5.3.18-59.16.1fixed 5.3.18-59.16.1

    A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space

  • CVE-2021-35039Jul 7, 2021
    affected < 5.3.18-59.19.1fixed 5.3.18-59.19.1

    kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.

  • CVE-2020-28097Jun 24, 2021
    affected < 5.3.18-150300.59.49.1fixed 5.3.18-150300.59.49.1

    The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.

  • CVE-2021-33624Jun 23, 2021
    affected < 5.3.18-59.13.1fixed 5.3.18-59.13.1

    In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.

  • CVE-2021-0605Jun 22, 2021
    affected < 5.3.18-59.13.1fixed 5.3.18-59.13.1

    In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Androi

Page 13 of 17