The Linux Kernel, the operating system core itself.
Security Fix(es):
An improper validation of an array index and out of bounds memory read in the Linux kernel s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.(CVE-2021-3896)
A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.(CVE-2021-3760)
A flaw was found in the Linux kernel s CAPI over Bluetooth connection code. An attacker with a local account can escalate privileges when CAPI (ISDN) hardware connection fails.(CVE-2021-34981)
Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150(CVE-2020-3702)
UAF in Android ION memory allocator.(CVE-2021-0929)
A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.(CVE-2021-20322)
A flaw was found in s390 eBPF JIT in bpfjitinsn in arch/s390/net/bpfjitcomp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.(CVE-2021-20320)
An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detachcapictr function in drivers/isdn/capi/kcapi.c.(CVE-2021-43389)
Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccpshctx_ccid object as a listener after being released.(CVE-2020-16119)
{ "severity": "High" }
{ "src": [ "kernel-4.19.90-2111.3.0.0121.oe1.src.rpm" ], "x86_64": [ "kernel-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "python3-perf-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "perf-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-devel-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "python2-perf-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-tools-devel-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "python3-perf-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "python2-perf-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-tools-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "perf-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-tools-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "bpftool-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "bpftool-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-debugsource-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-source-4.19.90-2111.3.0.0121.oe1.x86_64.rpm" ], "aarch64": [ "bpftool-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-tools-devel-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-tools-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "perf-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-devel-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "python2-perf-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "perf-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-tools-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-debugsource-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-source-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "python2-perf-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "python3-perf-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "python3-perf-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "bpftool-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm" ] }
{ "src": [ "kernel-4.19.90-2111.3.0.0121.oe1.src.rpm" ], "x86_64": [ "python2-perf-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-source-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-devel-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-tools-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-tools-devel-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "python2-perf-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "bpftool-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "python3-perf-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "python3-perf-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-debugsource-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-tools-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "perf-debuginfo-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "perf-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "bpftool-4.19.90-2111.3.0.0121.oe1.x86_64.rpm", "kernel-4.19.90-2111.3.0.0121.oe1.x86_64.rpm" ], "aarch64": [ "perf-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "perf-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-tools-devel-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-tools-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "python2-perf-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-tools-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "bpftool-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-devel-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "python2-perf-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-source-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "bpftool-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "python3-perf-debuginfo-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "python3-perf-4.19.90-2111.3.0.0121.oe1.aarch64.rpm", "kernel-debugsource-4.19.90-2111.3.0.0121.oe1.aarch64.rpm" ] }