rpm package
opensuse/kernel-obs-qa&distro=openSUSE Leap 15.2
pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.2
Vulnerabilities (187)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-33909 | — | < 5.3.18-lp152.84.1 | 5.3.18-lp152.84.1 | Jul 20, 2021 | fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05. | ||
| CVE-2021-3612 | — | < 5.3.18-lp152.84.1 | 5.3.18-lp152.84.1 | Jul 9, 2021 | An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highe | ||
| CVE-2021-22555 | — | KEV | < 5.3.18-lp152.84.1 | 5.3.18-lp152.84.1 | Jul 7, 2021 | A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space | |
| CVE-2021-35039 | — | < 5.3.18-lp152.84.1 | 5.3.18-lp152.84.1 | Jul 7, 2021 | kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument. | ||
| CVE-2021-3491 | — | < 5.3.18-lp152.78.1 | 5.3.18-lp152.78.1 | Jun 4, 2021 | The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc//mem. This could be used to create a heap overflow leading to arbitrary code executi | ||
| CVE-2021-33200 | — | < 5.3.18-lp152.78.1 | 5.3.18-lp152.78.1 | May 27, 2021 | kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, | ||
| CVE-2021-20177 | — | < 5.3.18-lp152.63.1 | 5.3.18-lp152.63.1 | May 26, 2021 | A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected. | ||
| CVE-2020-27815 | — | < 5.3.18-lp152.69.1 | 5.3.18-lp152.69.1 | May 26, 2021 | A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, int | ||
| CVE-2020-25669 | — | < 5.3.18-lp152.54.1 | 5.3.18-lp152.54.1 | May 26, 2021 | A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free. | ||
| CVE-2020-25668 | — | < 5.3.18-lp152.50.1 | 5.3.18-lp152.50.1 | May 26, 2021 | A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op. | ||
| CVE-2020-25673 | — | < 5.3.18-lp152.72.1 | 5.3.18-lp152.72.1 | May 26, 2021 | A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system. | ||
| CVE-2020-25671 | — | < 5.3.18-lp152.72.1 | 5.3.18-lp152.72.1 | May 26, 2021 | A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations. | ||
| CVE-2021-22543 | — | < 5.3.18-lp152.87.1 | 5.3.18-lp152.87.1 | May 26, 2021 | An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pag | ||
| CVE-2020-25670 | — | < 5.3.18-lp152.72.1 | 5.3.18-lp152.72.1 | May 26, 2021 | A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations. | ||
| CVE-2020-25672 | — | < 5.3.18-lp152.72.1 | 5.3.18-lp152.72.1 | May 25, 2021 | A memory leak vulnerability was found in Linux kernel in llcp_sock_connect | ||
| CVE-2021-3483 | — | < 5.3.18-lp152.72.1 | 5.3.18-lp152.72.1 | May 17, 2021 | A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as we | ||
| CVE-2021-33033 | — | < 5.3.18-lp152.102.1 | 5.3.18-lp152.102.1 | May 14, 2021 | The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value. | ||
| CVE-2021-33034 | — | < 5.3.18-lp152.78.1 | 5.3.18-lp152.78.1 | May 14, 2021 | In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value. | ||
| CVE-2020-27830 | — | < 5.3.18-lp152.60.1 | 5.3.18-lp152.60.1 | May 13, 2021 | A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash. | ||
| CVE-2021-23134 | — | < 5.3.18-lp152.78.1 | 5.3.18-lp152.78.1 | May 12, 2021 | Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability. |
- CVE-2021-33909Jul 20, 2021affected < 5.3.18-lp152.84.1fixed 5.3.18-lp152.84.1
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
- CVE-2021-3612Jul 9, 2021affected < 5.3.18-lp152.84.1fixed 5.3.18-lp152.84.1
An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highe
- affected < 5.3.18-lp152.84.1fixed 5.3.18-lp152.84.1
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
- CVE-2021-35039Jul 7, 2021affected < 5.3.18-lp152.84.1fixed 5.3.18-lp152.84.1
kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.
- CVE-2021-3491Jun 4, 2021affected < 5.3.18-lp152.78.1fixed 5.3.18-lp152.78.1
The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc//mem. This could be used to create a heap overflow leading to arbitrary code executi
- CVE-2021-33200May 27, 2021affected < 5.3.18-lp152.78.1fixed 5.3.18-lp152.78.1
kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular,
- CVE-2021-20177May 26, 2021affected < 5.3.18-lp152.63.1fixed 5.3.18-lp152.63.1
A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.
- CVE-2020-27815May 26, 2021affected < 5.3.18-lp152.69.1fixed 5.3.18-lp152.69.1
A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, int
- CVE-2020-25669May 26, 2021affected < 5.3.18-lp152.54.1fixed 5.3.18-lp152.54.1
A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
- CVE-2020-25668May 26, 2021affected < 5.3.18-lp152.50.1fixed 5.3.18-lp152.50.1
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
- CVE-2020-25673May 26, 2021affected < 5.3.18-lp152.72.1fixed 5.3.18-lp152.72.1
A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.
- CVE-2020-25671May 26, 2021affected < 5.3.18-lp152.72.1fixed 5.3.18-lp152.72.1
A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.
- CVE-2021-22543May 26, 2021affected < 5.3.18-lp152.87.1fixed 5.3.18-lp152.87.1
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pag
- CVE-2020-25670May 26, 2021affected < 5.3.18-lp152.72.1fixed 5.3.18-lp152.72.1
A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.
- CVE-2020-25672May 25, 2021affected < 5.3.18-lp152.72.1fixed 5.3.18-lp152.72.1
A memory leak vulnerability was found in Linux kernel in llcp_sock_connect
- CVE-2021-3483May 17, 2021affected < 5.3.18-lp152.72.1fixed 5.3.18-lp152.72.1
A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as we
- CVE-2021-33033May 14, 2021affected < 5.3.18-lp152.102.1fixed 5.3.18-lp152.102.1
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
- CVE-2021-33034May 14, 2021affected < 5.3.18-lp152.78.1fixed 5.3.18-lp152.78.1
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
- CVE-2020-27830May 13, 2021affected < 5.3.18-lp152.60.1fixed 5.3.18-lp152.60.1
A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.
- CVE-2021-23134May 12, 2021affected < 5.3.18-lp152.78.1fixed 5.3.18-lp152.78.1
Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.
Page 3 of 10