VYPR

rpm package

suse/kernel-zfcpdump&distro=SUSE Manager Server 4.3

pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Manager%20Server%204.3

Vulnerabilities (1,907)

  • CVE-2021-4148Mar 23, 2022
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.

  • CVE-2022-0854Mar 23, 2022
    affected < 5.14.21-150400.24.128.1fixed 5.14.21-150400.24.128.1

    A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.

  • CVE-2021-39698Mar 16, 2022
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android ke

  • CVE-2021-43527Dec 8, 2021
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted.

  • CVE-2021-43056Oct 28, 2021
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.

  • CVE-2020-26555May 24, 2021
    affected < 5.14.21-150400.24.103.1fixed 5.14.21-150400.24.103.1

    Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.

  • CVE-2017-5753Jan 4, 2018
    affected < 5.14.21-150400.24.161.1fixed 5.14.21-150400.24.161.1

    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Page 96 of 96