VYPR

rpm package

suse/kernel-rt&distro=SUSE Linux Enterprise Micro 5.1

pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Vulnerabilities (1,613)

  • CVE-2021-22600KEVJan 26, 2022
    affected < 5.3.18-150300.76.1fixed 5.3.18-150300.76.1

    A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

  • CVE-2021-34866Jan 25, 2022
    affected < 5.3.18-60.1fixed 5.3.18-60.1

    This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists with

  • CVE-2021-4001Jan 21, 2022
    affected < 5.3.18-68.1fixed 5.3.18-68.1

    A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space.

  • CVE-2021-4083Jan 18, 2022
    affected < 5.3.18-150300.71.1fixed 5.3.18-150300.71.1

    A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalat

  • CVE-2021-46283Jan 11, 2022
    affected < 5.3.18-150300.71.1fixed 5.3.18-150300.71.1

    nf_tables_newset in net/netfilter/nf_tables_api.c in the Linux kernel before 5.12.13 allows local users to cause a denial of service (NULL pointer dereference and general protection fault) because of the missing initialization for nft_set_elem_expr_alloc. A local user can set a n

  • CVE-2021-28715Jan 6, 2022
    affected < 5.3.18-68.1fixed 5.3.18-68.1

    Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are b

  • CVE-2021-28714Jan 6, 2022
    affected < 5.3.18-68.1fixed 5.3.18-68.1

    Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are b

  • CVE-2021-28713Jan 5, 2022
    affected < 5.3.18-68.1fixed 5.3.18-68.1

    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically re

  • CVE-2021-28712Jan 5, 2022
    affected < 5.3.18-68.1fixed 5.3.18-68.1

    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically re

  • CVE-2021-28711Jan 5, 2022
    affected < 5.3.18-68.1fixed 5.3.18-68.1

    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically re

  • CVE-2021-45485Dec 25, 2021
    affected < 5.3.18-68.1fixed 5.3.18-68.1

    In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.

  • CVE-2021-45486Dec 25, 2021
    affected < 5.3.18-68.1fixed 5.3.18-68.1

    In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small.

  • CVE-2021-44733Dec 22, 2021
    affected < 5.3.18-150300.71.1fixed 5.3.18-150300.71.1

    A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.

  • CVE-2021-45095Dec 16, 2021
    affected < 5.3.18-150300.76.1fixed 5.3.18-150300.76.1

    pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.

  • CVE-2021-39657Dec 15, 2021
    affected < 5.3.18-150300.76.1fixed 5.3.18-150300.76.1

    In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions:

  • CVE-2021-39648Dec 15, 2021
    affected < 5.3.18-150300.76.1fixed 5.3.18-150300.76.1

    In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersio

  • CVE-2021-0920KEVDec 15, 2021
    affected < 5.3.18-150300.82.1fixed 5.3.18-150300.82.1

    In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndro

  • CVE-2021-43527Dec 8, 2021
    affected < 5.3.18-150300.172.1fixed 5.3.18-150300.172.1

    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted.

  • CVE-2021-33098Nov 17, 2021
    affected < 5.3.18-68.1fixed 5.3.18-68.1

    Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may allow an authenticated user to potentially enable denial of service via local access.

  • CVE-2021-43975Nov 17, 2021
    affected < 5.3.18-68.1fixed 5.3.18-68.1

    In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.