rpm package
almalinux/kernel-debug-modules-extra
pkg:rpm/almalinux/kernel-debug-modules-extra
Vulnerabilities (1,153)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-1852 | — | < 4.18.0-425.3.1.el8 | 4.18.0-425.3.1.el8 | Jun 30, 2022 | A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU. | ||
| CVE-2022-2078 | — | < 5.14.0-70.26.1.el9_0 | 5.14.0-70.26.1.el9_0 | Jun 30, 2022 | A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code. | ||
| CVE-2022-21166 | — | < 4.18.0-372.26.1.el8_6 | 4.18.0-372.26.1.el8_6 | Jun 15, 2022 | Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | ||
| CVE-2022-21125 | — | < 4.18.0-372.26.1.el8_6 | 4.18.0-372.26.1.el8_6 | Jun 15, 2022 | Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | ||
| CVE-2022-21123 | — | < 4.18.0-372.26.1.el8_6 | 4.18.0-372.26.1.el8_6 | Jun 15, 2022 | Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | ||
| CVE-2022-20141 | — | < 5.14.0-284.11.1.el9_2 | 5.14.0-284.11.1.el9_2 | Jun 15, 2022 | In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product | ||
| CVE-2022-21499 | — | < 4.18.0-425.3.1.el8 | 4.18.0-425.3.1.el8 | Jun 9, 2022 | KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Scor | ||
| CVE-2022-1998 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Jun 9, 2022 | A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system. | ||
| CVE-2022-32250 | — | < 4.18.0-372.19.1.el8_6 | 4.18.0-372.19.1.el8_6 | Jun 2, 2022 | net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free. | ||
| CVE-2022-1789 | — | < 5.14.0-284.11.1.el9_2 | 5.14.0-284.11.1.el9_2 | May 31, 2022 | With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference. | ||
| CVE-2022-1462 | — | < 5.14.0-284.11.1.el9_2 | 5.14.0-284.11.1.el9_2 | May 31, 2022 | An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local u | ||
| CVE-2022-1882 | — | < 5.14.0-284.11.1.el9_2 | 5.14.0-284.11.1.el9_2 | May 26, 2022 | A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on t | ||
| CVE-2022-29581 | — | < 4.18.0-425.3.1.el8 | 4.18.0-425.3.1.el8 | May 17, 2022 | Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions. | ||
| CVE-2022-1679 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | May 16, 2022 | A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system. | ||
| CVE-2022-30594 | — | < 5.14.0-70.30.1.el9_0 | 5.14.0-70.30.1.el9_0 | May 12, 2022 | The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag. | ||
| CVE-2022-1353 | — | < 4.18.0-372.32.1.el8_6 | 4.18.0-372.32.1.el8_6 | Apr 29, 2022 | A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information. | ||
| CVE-2022-1048 | — | < 4.18.0-425.3.1.el8 | 4.18.0-425.3.1.el8 | Apr 29, 2022 | A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalat | ||
| CVE-2022-1280 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Apr 13, 2022 | A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak. | ||
| CVE-2022-28893 | — | < 4.18.0-425.3.1.el8 | 4.18.0-425.3.1.el8 | Apr 11, 2022 | The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state. | ||
| CVE-2022-28388 | — | < 5.14.0-284.11.1.el9_2 | 5.14.0-284.11.1.el9_2 | Apr 3, 2022 | usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free. |
- CVE-2022-1852Jun 30, 2022affected < 4.18.0-425.3.1.el8fixed 4.18.0-425.3.1.el8
A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.
- CVE-2022-2078Jun 30, 2022affected < 5.14.0-70.26.1.el9_0fixed 5.14.0-70.26.1.el9_0
A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.
- CVE-2022-21166Jun 15, 2022affected < 4.18.0-372.26.1.el8_6fixed 4.18.0-372.26.1.el8_6
Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2022-21125Jun 15, 2022affected < 4.18.0-372.26.1.el8_6fixed 4.18.0-372.26.1.el8_6
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2022-21123Jun 15, 2022affected < 4.18.0-372.26.1.el8_6fixed 4.18.0-372.26.1.el8_6
Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2022-20141Jun 15, 2022affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2
In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product
- CVE-2022-21499Jun 9, 2022affected < 4.18.0-425.3.1.el8fixed 4.18.0-425.3.1.el8
KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Scor
- CVE-2022-1998Jun 9, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
- CVE-2022-32250Jun 2, 2022affected < 4.18.0-372.19.1.el8_6fixed 4.18.0-372.19.1.el8_6
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
- CVE-2022-1789May 31, 2022affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2
With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.
- CVE-2022-1462May 31, 2022affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2
An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local u
- CVE-2022-1882May 26, 2022affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2
A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on t
- CVE-2022-29581May 17, 2022affected < 4.18.0-425.3.1.el8fixed 4.18.0-425.3.1.el8
Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
- CVE-2022-1679May 16, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.
- CVE-2022-30594May 12, 2022affected < 5.14.0-70.30.1.el9_0fixed 5.14.0-70.30.1.el9_0
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
- CVE-2022-1353Apr 29, 2022affected < 4.18.0-372.32.1.el8_6fixed 4.18.0-372.32.1.el8_6
A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.
- CVE-2022-1048Apr 29, 2022affected < 4.18.0-425.3.1.el8fixed 4.18.0-425.3.1.el8
A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalat
- CVE-2022-1280Apr 13, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.
- CVE-2022-28893Apr 11, 2022affected < 4.18.0-425.3.1.el8fixed 4.18.0-425.3.1.el8
The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.
- CVE-2022-28388Apr 3, 2022affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2
usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
Page 55 of 58