VYPR

rpm package

opensuse/kernel-syms&distro=openSUSE Leap 15.3

pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.3

Vulnerabilities (316)

  • CVE-2021-28714Jan 6, 2022
    affected < 5.3.18-59.40.1fixed 5.3.18-59.40.1

    Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are b

  • CVE-2021-28713Jan 5, 2022
    affected < 5.3.18-59.40.1fixed 5.3.18-59.40.1

    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically re

  • CVE-2021-28712Jan 5, 2022
    affected < 5.3.18-59.40.1fixed 5.3.18-59.40.1

    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically re

  • CVE-2021-28711Jan 5, 2022
    affected < 5.3.18-59.40.1fixed 5.3.18-59.40.1

    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically re

  • CVE-2021-45485Dec 25, 2021
    affected < 5.3.18-59.40.1fixed 5.3.18-59.40.1

    In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.

  • CVE-2021-45486Dec 25, 2021
    affected < 5.3.18-59.40.1fixed 5.3.18-59.40.1

    In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small.

  • CVE-2021-44733Dec 22, 2021
    affected < 5.3.18-150300.59.49.1fixed 5.3.18-150300.59.49.1

    A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.

  • CVE-2021-45095Dec 16, 2021
    affected < 5.3.18-150300.59.49.1fixed 5.3.18-150300.59.49.1

    pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.

  • CVE-2021-39657Dec 15, 2021
    affected < 5.3.18-150300.59.49.1fixed 5.3.18-150300.59.49.1

    In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions:

  • CVE-2021-39648Dec 15, 2021
    affected < 5.3.18-150300.59.49.1fixed 5.3.18-150300.59.49.1

    In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersio

  • CVE-2021-0920KEVDec 15, 2021
    affected < 5.3.18-150300.59.60.4fixed 5.3.18-150300.59.60.4

    In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndro

  • CVE-2021-43975Nov 17, 2021
    affected < 5.3.18-59.40.1fixed 5.3.18-59.40.1

    In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.

  • CVE-2021-43976Nov 17, 2021
    affected < 5.3.18-59.40.1fixed 5.3.18-59.40.1

    In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).

  • CVE-2021-43389Nov 4, 2021
    affected < 5.3.18-59.34.1fixed 5.3.18-59.34.1

    An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.

  • CVE-2020-27820Nov 2, 2021
    affected < 5.3.18-59.40.1fixed 5.3.18-59.40.1

    A vulnerability was found in Linux kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver).

  • CVE-2021-43056Oct 28, 2021
    affected < 5.3.18-59.34.1fixed 5.3.18-59.34.1

    An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.

  • CVE-2021-0941Oct 25, 2021
    affected < 5.3.18-59.37.1fixed 5.3.18-59.37.1

    In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAn

  • CVE-2021-42739Oct 20, 2021
    affected < 5.3.18-59.34.1fixed 5.3.18-59.34.1

    The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.

  • CVE-2021-42252Oct 11, 2021
    affected < 5.3.18-59.34.1fixed 5.3.18-59.34.1

    An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1

  • CVE-2021-42008Oct 4, 2021
    affected < 5.3.18-59.34.1fixed 5.3.18-59.34.1

    The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.

Page 11 of 16