VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Micro 5.3

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.3

Vulnerabilities (3,014)

  • CVE-2022-20154Jun 15, 2022
    affected < 5.14.21-150400.24.116.1fixed 5.14.21-150400.24.116.1

    In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:

  • CVE-2022-32296Jun 5, 2022
    affected < 5.14.21-150400.24.28.1fixed 5.14.21-150400.24.28.1

    The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.

  • CVE-2022-1882May 26, 2022
    affected < 5.14.21-150400.24.33.2fixed 5.14.21-150400.24.33.2

    A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on t

  • CVE-2022-1679May 16, 2022
    affected < 5.14.21-150400.24.170.2fixed 5.14.21-150400.24.170.2

    A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.

  • CVE-2022-1048Apr 29, 2022
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalat

  • CVE-2022-0995Mar 25, 2022
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.

  • CVE-2021-4148Mar 23, 2022
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.

  • CVE-2022-0854Mar 23, 2022
    affected < 5.14.21-150400.24.128.1fixed 5.14.21-150400.24.128.1

    A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.

  • CVE-2021-39698Mar 16, 2022
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android ke

  • CVE-2021-43527Dec 8, 2021
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted.

  • CVE-2021-43056Oct 28, 2021
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.

  • CVE-2020-26555May 24, 2021
    affected < 5.14.21-150400.24.103.1fixed 5.14.21-150400.24.103.1

    Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.

  • CVE-2020-24588LowMay 11, 2021
    affected < 5.14.21-150400.24.46.1fixed 5.14.21-150400.24.46.1

    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is manda

  • CVE-2017-5753Jan 4, 2018
    affected < 5.14.21-150400.24.60.1fixed 5.14.21-150400.24.60.1

    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Page 151 of 151