VYPR

rpm package

almalinux/kernel-abi-stablelists

pkg:rpm/almalinux/kernel-abi-stablelists

Vulnerabilities (1,161)

  • CVE-2020-36558Jul 21, 2022
    affected < 4.18.0-425.3.1.el8fixed 4.18.0-425.3.1.el8

    A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault.

  • CVE-2021-33655Jul 18, 2022
    affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2

    When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.

  • CVE-2021-33656Jul 18, 2022
    affected < 4.18.0-477.10.1.el8_8fixed 4.18.0-477.10.1.el8_8

    When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds.

  • CVE-2022-23825Jul 14, 2022
    affected < 4.18.0-372.32.1.el8_6fixed 4.18.0-372.32.1.el8_6

    Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.

  • CVE-2022-29900Jul 12, 2022
    affected < 4.18.0-372.32.1.el8_6fixed 4.18.0-372.32.1.el8_6

    Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

  • CVE-2022-29901Jul 12, 2022
    affected < 4.18.0-372.32.1.el8_6fixed 4.18.0-372.32.1.el8_6

    Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code exe

  • CVE-2022-33743Jul 5, 2022
    affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2

    network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.

  • CVE-2022-34918Jul 4, 2022
    affected < 5.14.0-70.26.1.el9_0fixed 5.14.0-70.26.1.el9_0

    An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but

  • CVE-2022-1852Jun 30, 2022
    affected < 4.18.0-425.3.1.el8fixed 4.18.0-425.3.1.el8

    A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.

  • CVE-2022-2078Jun 30, 2022
    affected < 5.14.0-70.26.1.el9_0fixed 5.14.0-70.26.1.el9_0

    A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.

  • CVE-2022-21166Jun 15, 2022
    affected < 4.18.0-372.26.1.el8_6fixed 4.18.0-372.26.1.el8_6

    Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2022-21125Jun 15, 2022
    affected < 4.18.0-372.26.1.el8_6fixed 4.18.0-372.26.1.el8_6

    Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2022-21123Jun 15, 2022
    affected < 4.18.0-372.26.1.el8_6fixed 4.18.0-372.26.1.el8_6

    Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2022-20141Jun 15, 2022
    affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2

    In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product

  • CVE-2022-21499Jun 9, 2022
    affected < 4.18.0-425.3.1.el8fixed 4.18.0-425.3.1.el8

    KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Scor

  • CVE-2022-1998Jun 9, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.

  • CVE-2022-32250Jun 2, 2022
    affected < 4.18.0-372.19.1.el8_6fixed 4.18.0-372.19.1.el8_6

    net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.

  • CVE-2022-1789May 31, 2022
    affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2

    With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.

  • CVE-2022-1462May 31, 2022
    affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2

    An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local u

  • CVE-2022-1882May 26, 2022
    affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2

    A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on t

Page 55 of 59