VYPR

rpm package

suse/kernel-preempt&distro=SUSE Linux Enterprise Module for Basesystem 15 SP2

pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2

Vulnerabilities (194)

  • CVE-2021-37159Jul 21, 2021
    affected < 5.3.18-24.96.1fixed 5.3.18-24.96.1

    hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.

  • CVE-2021-33909Jul 20, 2021
    affected < 5.3.18-24.75.3fixed 5.3.18-24.75.3

    fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.

  • CVE-2021-3612Jul 9, 2021
    affected < 5.3.18-24.75.3fixed 5.3.18-24.75.3

    An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highe

  • CVE-2021-22555KEVJul 7, 2021
    affected < 5.3.18-24.75.3fixed 5.3.18-24.75.3

    A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space

  • CVE-2021-35039Jul 7, 2021
    affected < 5.3.18-24.75.3fixed 5.3.18-24.75.3

    kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.

  • CVE-2021-33624Jun 23, 2021
    affected < 5.3.18-24.70.1fixed 5.3.18-24.70.1

    In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.

  • CVE-2021-0605Jun 22, 2021
    affected < 5.3.18-24.70.1fixed 5.3.18-24.70.1

    In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Androi

  • CVE-2021-0512Jun 21, 2021
    affected < 5.3.18-24.70.1fixed 5.3.18-24.70.1

    In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Prod

  • CVE-2021-34693Jun 14, 2021
    affected < 5.3.18-24.70.1fixed 5.3.18-24.70.1

    net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.

  • CVE-2021-0129Jun 9, 2021
    affected < 5.3.18-24.70.1fixed 5.3.18-24.70.1

    Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.

  • CVE-2020-36386Jun 7, 2021
    affected < 5.3.18-24.70.1fixed 5.3.18-24.70.1

    An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.

  • CVE-2020-36385Jun 7, 2021
    affected < 5.3.18-24.70.1fixed 5.3.18-24.70.1

    An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.

  • CVE-2021-3491Jun 4, 2021
    affected < 5.3.18-24.67.4fixed 5.3.18-24.67.4

    The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc//mem. This could be used to create a heap overflow leading to arbitrary code executi

  • CVE-2021-33200May 27, 2021
    affected < 5.3.18-24.67.4fixed 5.3.18-24.67.4

    kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular,

  • CVE-2021-20177May 26, 2021
    affected < 5.3.18-24.49.2fixed 5.3.18-24.49.2

    A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.

  • CVE-2020-27815May 26, 2021
    affected < 5.3.18-24.61.1fixed 5.3.18-24.61.1

    A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, int

  • CVE-2020-25669May 26, 2021
    affected < 5.3.18-24.43.2fixed 5.3.18-24.43.2

    A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.

  • CVE-2020-25668May 26, 2021
    affected < 5.3.18-24.43.2fixed 5.3.18-24.43.2

    A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.

  • CVE-2020-25673May 26, 2021
    affected < 5.3.18-24.61.1fixed 5.3.18-24.61.1

    A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.

  • CVE-2020-25671May 26, 2021
    affected < 5.3.18-24.61.1fixed 5.3.18-24.61.1

    A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.

Page 3 of 10