VYPR

rpm package

suse/kernel-livepatch-SLE15-SP3_Update_2&distro=SUSE Linux Enterprise Live Patching 15 SP3

pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3

Vulnerabilities (47)

  • CVE-2021-22555KEVJul 7, 2021
    affected < 2-2.1fixed 2-2.1

    A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space

  • CVE-2021-0129Jun 9, 2021
    affected < 1-7.5.1fixed 1-7.5.1

    Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.

  • CVE-2020-36386Jun 7, 2021
    affected < 1-7.5.1fixed 1-7.5.1

    An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.

  • CVE-2020-36385Jun 7, 2021
    affected < 1-7.5.1fixed 1-7.5.1

    An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.

  • CVE-2021-22543May 26, 2021
    affected < 3-2.1fixed 3-2.1

    An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pag

  • CVE-2020-26558May 24, 2021
    affected < 1-7.5.1fixed 1-7.5.1

    Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evide

  • CVE-2020-3702Sep 8, 2020
    affected < 8-150300.2.2fixed 8-150300.2.2

    u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapd

Page 3 of 3