VYPR

rpm package

suse/kernel-source&distro=SUSE Linux Enterprise Server 15 SP3-LTSS

pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS

Vulnerabilities (1,483)

  • CVE-2022-20154Jun 15, 2022
    affected < 5.3.18-150300.59.153.2fixed 5.3.18-150300.59.153.2

    In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:

  • CVE-2022-20132Jun 15, 2022
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges n

  • CVE-2022-1679May 16, 2022
    affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1

    A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.

  • CVE-2022-1195Apr 29, 2022
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.

  • CVE-2022-1048Apr 29, 2022
    affected < 5.3.18-150300.59.201.1fixed 5.3.18-150300.59.201.1

    A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalat

  • CVE-2022-0435Mar 25, 2022
    affected < 5.3.18-150300.59.167.1fixed 5.3.18-150300.59.167.1

    A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate

  • CVE-2022-0854Mar 23, 2022
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.

  • CVE-2021-39698Mar 16, 2022
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android ke

  • CVE-2021-3743Mar 4, 2022
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat

  • CVE-2022-0487Feb 4, 2022
    affected < 5.3.18-150300.59.158.1fixed 5.3.18-150300.59.158.1

    A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.

  • CVE-2021-43527Dec 8, 2021
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted.

  • CVE-2021-43389Nov 4, 2021
    affected < 5.3.18-150300.59.167.1fixed 5.3.18-150300.59.167.1

    An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.

  • CVE-2021-43056Oct 28, 2021
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.

  • CVE-2021-0129Jun 9, 2021
    affected < 5.3.18-150300.59.170.1fixed 5.3.18-150300.59.170.1

    Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.

  • CVE-2020-26555May 24, 2021
    affected < 5.3.18-150300.59.147.1fixed 5.3.18-150300.59.147.1

    Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.

  • CVE-2020-26558May 24, 2021
    affected < 5.3.18-150300.59.170.1fixed 5.3.18-150300.59.170.1

    Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evide

  • CVE-2021-23134May 12, 2021
    affected < 5.3.18-150300.59.158.1fixed 5.3.18-150300.59.158.1

    Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.

  • CVE-2021-32399May 10, 2021
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.

  • CVE-2021-29155Apr 20, 2021
    affected < 5.3.18-150300.59.158.1fixed 5.3.18-150300.59.158.1

    An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specificall

  • CVE-2021-29650Mar 30, 2021
    affected < 5.3.18-150300.59.124.1fixed 5.3.18-150300.59.124.1

    An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, a

Page 74 of 75