rpm package
suse/kernel-default-base&distro=SUSE Linux Enterprise Micro 5.2
pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.2
Vulnerabilities (1,696)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-38208 | — | < 5.3.18-150300.59.68.1.150300.18.41.3 | 5.3.18-150300.59.68.1.150300.18.41.3 | Aug 8, 2021 | net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call. | ||
| CVE-2021-0129 | — | < 5.3.18-150300.59.170.1.150300.18.100.1 | 5.3.18-150300.59.170.1.150300.18.100.1 | Jun 9, 2021 | Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. | ||
| CVE-2021-20292 | — | < 5.3.18-150300.59.68.1.150300.18.41.3 | 5.3.18-150300.59.68.1.150300.18.41.3 | May 28, 2021 | There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the obje | ||
| CVE-2020-26555 | — | < 5.3.18-150300.59.147.2.150300.18.86.2 | 5.3.18-150300.59.147.2.150300.18.86.2 | May 24, 2021 | Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN. | ||
| CVE-2020-26558 | — | < 5.3.18-150300.59.170.1.150300.18.100.1 | 5.3.18-150300.59.170.1.150300.18.100.1 | May 24, 2021 | Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evide | ||
| CVE-2021-23134 | — | < 5.3.18-150300.59.158.1.150300.18.92.5 | 5.3.18-150300.59.158.1.150300.18.92.5 | May 12, 2021 | Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability. | ||
| CVE-2021-32399 | — | < 5.3.18-150300.59.207.1.150300.18.124.1 | 5.3.18-150300.59.207.1.150300.18.124.1 | May 10, 2021 | net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller. | ||
| CVE-2021-29155 | — | < 5.3.18-150300.59.158.1.150300.18.92.5 | 5.3.18-150300.59.158.1.150300.18.92.5 | Apr 20, 2021 | An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specificall | ||
| CVE-2021-29650 | — | < 5.3.18-150300.59.124.1.150300.18.72.1 | 5.3.18-150300.59.124.1.150300.18.72.1 | Mar 30, 2021 | An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, a | ||
| CVE-2020-16119 | — | < 5.3.18-150300.59.98.1.150300.18.56.3 | 5.3.18-150300.59.98.1.150300.18.56.3 | Jan 14, 2021 | Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0 | ||
| CVE-2020-27835 | — | < 5.3.18-150300.59.68.1.150300.18.41.3 | 5.3.18-150300.59.68.1.150300.18.41.3 | Jan 7, 2021 | A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system. | ||
| CVE-2020-26541 | — | < 5.3.18-150300.59.76.1.150300.18.45.2 | 5.3.18-150300.59.76.1.150300.18.45.2 | Oct 2, 2020 | The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c. | ||
| CVE-2019-19377 | — | < 5.3.18-150300.59.71.2.150300.18.43.2 | 5.3.18-150300.59.71.2.150300.18.43.2 | Nov 29, 2019 | In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c. | ||
| CVE-2019-19083 | — | < 5.3.18-150300.59.109.1.150300.18.62.1 | 5.3.18-150300.59.109.1.150300.18.62.1 | Nov 18, 2019 | Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce11 | ||
| CVE-2017-5753 | — | < 5.3.18-150300.59.118.1.150300.18.68.1 | 5.3.18-150300.59.118.1.150300.18.68.1 | Jan 4, 2018 | Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | ||
| CVE-2016-3695 | Med | 5.5 | < 5.3.18-150300.59.93.1.150300.18.54.1 | 5.3.18-150300.59.93.1.150300.18.54.1 | Dec 29, 2017 | The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set. |
- CVE-2021-38208Aug 8, 2021affected < 5.3.18-150300.59.68.1.150300.18.41.3fixed 5.3.18-150300.59.68.1.150300.18.41.3
net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.
- CVE-2021-0129Jun 9, 2021affected < 5.3.18-150300.59.170.1.150300.18.100.1fixed 5.3.18-150300.59.170.1.150300.18.100.1
Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
- CVE-2021-20292May 28, 2021affected < 5.3.18-150300.59.68.1.150300.18.41.3fixed 5.3.18-150300.59.68.1.150300.18.41.3
There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the obje
- CVE-2020-26555May 24, 2021affected < 5.3.18-150300.59.147.2.150300.18.86.2fixed 5.3.18-150300.59.147.2.150300.18.86.2
Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
- CVE-2020-26558May 24, 2021affected < 5.3.18-150300.59.170.1.150300.18.100.1fixed 5.3.18-150300.59.170.1.150300.18.100.1
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evide
- CVE-2021-23134May 12, 2021affected < 5.3.18-150300.59.158.1.150300.18.92.5fixed 5.3.18-150300.59.158.1.150300.18.92.5
Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.
- CVE-2021-32399May 10, 2021affected < 5.3.18-150300.59.207.1.150300.18.124.1fixed 5.3.18-150300.59.207.1.150300.18.124.1
net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.
- CVE-2021-29155Apr 20, 2021affected < 5.3.18-150300.59.158.1.150300.18.92.5fixed 5.3.18-150300.59.158.1.150300.18.92.5
An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specificall
- CVE-2021-29650Mar 30, 2021affected < 5.3.18-150300.59.124.1.150300.18.72.1fixed 5.3.18-150300.59.124.1.150300.18.72.1
An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, a
- CVE-2020-16119Jan 14, 2021affected < 5.3.18-150300.59.98.1.150300.18.56.3fixed 5.3.18-150300.59.98.1.150300.18.56.3
Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0
- CVE-2020-27835Jan 7, 2021affected < 5.3.18-150300.59.68.1.150300.18.41.3fixed 5.3.18-150300.59.68.1.150300.18.41.3
A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.
- CVE-2020-26541Oct 2, 2020affected < 5.3.18-150300.59.76.1.150300.18.45.2fixed 5.3.18-150300.59.76.1.150300.18.45.2
The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.
- CVE-2019-19377Nov 29, 2019affected < 5.3.18-150300.59.71.2.150300.18.43.2fixed 5.3.18-150300.59.71.2.150300.18.43.2
In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.
- CVE-2019-19083Nov 18, 2019affected < 5.3.18-150300.59.109.1.150300.18.62.1fixed 5.3.18-150300.59.109.1.150300.18.62.1
Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce11
- CVE-2017-5753Jan 4, 2018affected < 5.3.18-150300.59.118.1.150300.18.68.1fixed 5.3.18-150300.59.118.1.150300.18.68.1
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
- affected < 5.3.18-150300.59.93.1.150300.18.54.1fixed 5.3.18-150300.59.93.1.150300.18.54.1
The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.
Page 85 of 85