VYPR

rpm package

suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE Linux Enterprise Server 12 SP3-LTSS

pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS

Vulnerabilities (56)

  • CVE-2021-38160Aug 7, 2021
    affected < 7-2.1fixed 7-2.1

    In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any ex

  • CVE-2021-37576Jul 26, 2021
    affected < 5-2.1fixed 5-2.1

    arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.

  • CVE-2021-33909Jul 20, 2021
    affected < 4-2.1fixed 4-2.1

    fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.

  • CVE-2021-22555KEVJul 7, 2021
    affected < 4-2.1fixed 4-2.1

    A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space

  • CVE-2021-0605Jun 22, 2021
    affected < 3-2.1fixed 3-2.1

    In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Androi

  • CVE-2021-0512Jun 21, 2021
    affected < 3-2.1fixed 3-2.1

    In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Prod

  • CVE-2020-36385Jun 7, 2021
    affected < 4-2.1fixed 4-2.1

    An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.

  • CVE-2020-25673May 26, 2021
    affected < 1-4.3.1fixed 1-4.3.1

    A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.

  • CVE-2020-25671May 26, 2021
    affected < 1-4.3.1fixed 1-4.3.1

    A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.

  • CVE-2020-25670May 26, 2021
    affected < 1-4.3.1fixed 1-4.3.1

    A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.

  • CVE-2020-25672May 25, 2021
    affected < 1-4.3.1fixed 1-4.3.1

    A memory leak vulnerability was found in Linux kernel in llcp_sock_connect

  • CVE-2021-3483May 17, 2021
    affected < 1-4.3.1fixed 1-4.3.1

    A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as we

  • CVE-2021-33034May 14, 2021
    affected < 2-2.1fixed 2-2.1

    In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.

  • CVE-2021-23134May 12, 2021
    affected < 10-2.2fixed 10-2.2

    Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.

  • CVE-2020-36322Apr 14, 2021
    affected < 1-4.3.1fixed 1-4.3.1

    An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and i

  • CVE-2021-29154Apr 8, 2021
    affected < 1-4.3.1fixed 1-4.3.1

    BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.

  • CVE-2020-36312Apr 6, 2021
    affected < 1-4.3.1fixed 1-4.3.1

    An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.

  • CVE-2021-28688Apr 6, 2021
    affected < 2-2.1fixed 2-2.1

    The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup wo

  • CVE-2021-30002Apr 2, 2021
    affected < 1-4.3.1fixed 1-4.3.1

    An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.

  • CVE-2021-29650Mar 30, 2021
    affected < 1-4.3.1fixed 1-4.3.1

    An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, a