VYPR

rpm package

suse/kernel-syms&distro=SUSE Linux Enterprise Server 15 SP1-LTSS

pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS

Vulnerabilities (396)

  • CVE-2021-3679Aug 5, 2021
    affected < 4.12.14-197.102.2fixed 4.12.14-197.102.2

    A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causin

  • CVE-2021-34556Aug 2, 2021
    affected < 4.12.14-197.102.2fixed 4.12.14-197.102.2

    In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

  • CVE-2021-35477Aug 2, 2021
    affected < 4.12.14-197.102.2fixed 4.12.14-197.102.2

    In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an atta

  • CVE-2021-37576Jul 26, 2021
    affected < 4.12.14-197.102.2fixed 4.12.14-197.102.2

    arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.

  • CVE-2021-37159Jul 21, 2021
    affected < 4.12.14-197.102.2fixed 4.12.14-197.102.2

    hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.

  • CVE-2021-33909Jul 20, 2021
    affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1

    fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.

  • CVE-2021-22555KEVJul 7, 2021
    affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1

    A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space

  • CVE-2021-33624Jun 23, 2021
    affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1

    In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.

  • CVE-2021-0605Jun 22, 2021
    affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1

    In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Androi

  • CVE-2021-0512Jun 21, 2021
    affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1

    In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Prod

  • CVE-2021-34693Jun 14, 2021
    affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1

    net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.

  • CVE-2021-0129Jun 9, 2021
    affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1

    Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.

  • CVE-2021-3564Jun 8, 2021
    affected < 4.12.14-197.105.1fixed 4.12.14-197.105.1

    A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. This flaw affects all the Linux kernel versions starting from 3.

  • CVE-2020-36386Jun 7, 2021
    affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1

    An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.

  • CVE-2020-36385Jun 7, 2021
    affected < 4.12.14-197.99.1fixed 4.12.14-197.99.1

    An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.

  • CVE-2021-3491Jun 4, 2021
    affected < 4.12.14-197.92.1fixed 4.12.14-197.92.1

    The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc//mem. This could be used to create a heap overflow leading to arbitrary code executi

  • CVE-2021-20292May 28, 2021
    affected < 4.12.14-150100.197.114.2fixed 4.12.14-150100.197.114.2

    There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the obje

  • CVE-2021-33200May 27, 2021
    affected < 4.12.14-197.92.1fixed 4.12.14-197.92.1

    kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular,

  • CVE-2021-20177May 26, 2021
    affected < 4.12.14-197.83.1fixed 4.12.14-197.83.1

    A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.

  • CVE-2020-27815May 26, 2021
    affected < 4.12.14-197.89.2fixed 4.12.14-197.89.2

    A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, int

Page 16 of 20