VYPR

rpm package

suse/kernel-default-base&distro=SUSE Linux Enterprise Micro 5.1

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Vulnerabilities (1,638)

  • CVE-2020-26555May 24, 2021
    affected < 5.3.18-150300.59.147.2.150300.18.86.2fixed 5.3.18-150300.59.147.2.150300.18.86.2

    Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.

  • CVE-2020-26558May 24, 2021
    affected < 5.3.18-150300.59.170.1.150300.18.100.1fixed 5.3.18-150300.59.170.1.150300.18.100.1

    Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evide

  • CVE-2021-33033May 14, 2021
    affected < 5.3.18-59.34.1.18.21.1fixed 5.3.18-59.34.1.18.21.1

    The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.

  • CVE-2021-23134May 12, 2021
    affected < 5.3.18-150300.59.158.1.150300.18.92.5fixed 5.3.18-150300.59.158.1.150300.18.92.5

    Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.

  • CVE-2021-32399May 10, 2021
    affected < 5.3.18-150300.59.207.1.150300.18.124.1fixed 5.3.18-150300.59.207.1.150300.18.124.1

    net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.

  • CVE-2021-31916May 6, 2021
    affected < 5.3.18-59.37.2.18.23.3fixed 5.3.18-59.37.2.18.23.3

    An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memo

  • CVE-2021-29155Apr 20, 2021
    affected < 5.3.18-150300.59.158.1.150300.18.92.5fixed 5.3.18-150300.59.158.1.150300.18.92.5

    An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specificall

  • CVE-2021-29650Mar 30, 2021
    affected < 5.3.18-150300.59.124.1.150300.18.72.1fixed 5.3.18-150300.59.124.1.150300.18.72.1

    An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, a

  • CVE-2020-24504Feb 17, 2021
    affected < 5.3.18-59.40.1.18.25.1fixed 5.3.18-59.40.1.18.25.1

    Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux before version 1.0.4 may allow an authenticated user to potentially enable denial of service via local access.

  • CVE-2020-16119Jan 14, 2021
    affected < 5.3.18-150300.59.98.1.150300.18.56.3fixed 5.3.18-150300.59.98.1.150300.18.56.3

    Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0

  • CVE-2020-27835Jan 7, 2021
    affected < 5.3.18-150300.59.68.1.150300.18.41.3fixed 5.3.18-150300.59.68.1.150300.18.41.3

    A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.

  • CVE-2020-26541Oct 2, 2020
    affected < 5.3.18-150300.59.76.1.150300.18.45.2fixed 5.3.18-150300.59.76.1.150300.18.45.2

    The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.

  • CVE-2020-3702Sep 8, 2020
    affected < 5.3.18-59.27.1.18.15.1fixed 5.3.18-59.27.1.18.15.1

    u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapd

  • CVE-2020-12770May 9, 2020
    affected < 5.3.18-59.24.1.18.12.1fixed 5.3.18-59.24.1.18.12.1

    An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.

  • CVE-2019-19377Nov 29, 2019
    affected < 5.3.18-150300.59.71.2.150300.18.43.2fixed 5.3.18-150300.59.71.2.150300.18.43.2

    In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.

  • CVE-2019-19083Nov 18, 2019
    affected < 5.3.18-150300.59.109.1.150300.18.62.1fixed 5.3.18-150300.59.109.1.150300.18.62.1

    Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce11

  • CVE-2017-5753Jan 4, 2018
    affected < 5.3.18-150300.59.118.1.150300.18.68.1fixed 5.3.18-150300.59.118.1.150300.18.68.1

    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2016-3695MedDec 29, 2017
    affected < 5.3.18-150300.59.93.1.150300.18.54.1fixed 5.3.18-150300.59.93.1.150300.18.54.1

    The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.

Page 82 of 82