rpm package
suse/kernel-source&distro=SUSE Manager Server 4.0
pkg:rpm/suse/kernel-source&distro=SUSE%20Manager%20Server%204.0
Vulnerabilities (72)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-3428 | — | < 4.12.14-197.89.2 | 4.12.14-197.89.2 | Mar 4, 2022 | A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a sy | ||
| CVE-2021-3609 | — | < 4.12.14-197.99.1 | 4.12.14-197.99.1 | Mar 3, 2022 | .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege e | ||
| CVE-2021-33909 | — | < 4.12.14-197.99.1 | 4.12.14-197.99.1 | Jul 20, 2021 | fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05. | ||
| CVE-2021-22555 | — | KEV | < 4.12.14-197.99.1 | 4.12.14-197.99.1 | Jul 7, 2021 | A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space | |
| CVE-2021-33624 | — | < 4.12.14-197.99.1 | 4.12.14-197.99.1 | Jun 23, 2021 | In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db. | ||
| CVE-2021-0605 | — | < 4.12.14-197.99.1 | 4.12.14-197.99.1 | Jun 22, 2021 | In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Androi | ||
| CVE-2021-0512 | — | < 4.12.14-197.99.1 | 4.12.14-197.99.1 | Jun 21, 2021 | In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Prod | ||
| CVE-2021-34693 | — | < 4.12.14-197.99.1 | 4.12.14-197.99.1 | Jun 14, 2021 | net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. | ||
| CVE-2021-0129 | — | < 4.12.14-197.99.1 | 4.12.14-197.99.1 | Jun 9, 2021 | Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. | ||
| CVE-2020-36386 | — | < 4.12.14-197.99.1 | 4.12.14-197.99.1 | Jun 7, 2021 | An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf. | ||
| CVE-2020-36385 | — | < 4.12.14-197.99.1 | 4.12.14-197.99.1 | Jun 7, 2021 | An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c. | ||
| CVE-2021-3491 | — | < 4.12.14-197.92.1 | 4.12.14-197.92.1 | Jun 4, 2021 | The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc//mem. This could be used to create a heap overflow leading to arbitrary code executi | ||
| CVE-2021-33200 | — | < 4.12.14-197.92.1 | 4.12.14-197.92.1 | May 27, 2021 | kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, | ||
| CVE-2021-20177 | — | < 4.12.14-197.83.1 | 4.12.14-197.83.1 | May 26, 2021 | A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected. | ||
| CVE-2020-27815 | — | < 4.12.14-197.89.2 | 4.12.14-197.89.2 | May 26, 2021 | A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, int | ||
| CVE-2020-25673 | — | < 4.12.14-197.89.2 | 4.12.14-197.89.2 | May 26, 2021 | A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system. | ||
| CVE-2020-25671 | — | < 4.12.14-197.89.2 | 4.12.14-197.89.2 | May 26, 2021 | A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations. | ||
| CVE-2020-25670 | — | < 4.12.14-197.89.2 | 4.12.14-197.89.2 | May 26, 2021 | A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations. | ||
| CVE-2020-25672 | — | < 4.12.14-197.89.2 | 4.12.14-197.89.2 | May 25, 2021 | A memory leak vulnerability was found in Linux kernel in llcp_sock_connect | ||
| CVE-2020-26558 | — | < 4.12.14-197.99.1 | 4.12.14-197.99.1 | May 24, 2021 | Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evide |
- CVE-2021-3428Mar 4, 2022affected < 4.12.14-197.89.2fixed 4.12.14-197.89.2
A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a sy
- CVE-2021-3609Mar 3, 2022affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1
.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege e
- CVE-2021-33909Jul 20, 2021affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
- affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
- CVE-2021-33624Jun 23, 2021affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1
In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.
- CVE-2021-0605Jun 22, 2021affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1
In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Androi
- CVE-2021-0512Jun 21, 2021affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1
In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Prod
- CVE-2021-34693Jun 14, 2021affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
- CVE-2021-0129Jun 9, 2021affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1
Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
- CVE-2020-36386Jun 7, 2021affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1
An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.
- CVE-2020-36385Jun 7, 2021affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1
An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.
- CVE-2021-3491Jun 4, 2021affected < 4.12.14-197.92.1fixed 4.12.14-197.92.1
The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc//mem. This could be used to create a heap overflow leading to arbitrary code executi
- CVE-2021-33200May 27, 2021affected < 4.12.14-197.92.1fixed 4.12.14-197.92.1
kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular,
- CVE-2021-20177May 26, 2021affected < 4.12.14-197.83.1fixed 4.12.14-197.83.1
A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.
- CVE-2020-27815May 26, 2021affected < 4.12.14-197.89.2fixed 4.12.14-197.89.2
A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, int
- CVE-2020-25673May 26, 2021affected < 4.12.14-197.89.2fixed 4.12.14-197.89.2
A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.
- CVE-2020-25671May 26, 2021affected < 4.12.14-197.89.2fixed 4.12.14-197.89.2
A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.
- CVE-2020-25670May 26, 2021affected < 4.12.14-197.89.2fixed 4.12.14-197.89.2
A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.
- CVE-2020-25672May 25, 2021affected < 4.12.14-197.89.2fixed 4.12.14-197.89.2
A memory leak vulnerability was found in Linux kernel in llcp_sock_connect
- CVE-2020-26558May 24, 2021affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evide
Page 1 of 4