VYPR

rpm package

almalinux/kernel-devel-matched

pkg:rpm/almalinux/kernel-devel-matched

Vulnerabilities (782)

  • CVE-2022-2959Aug 25, 2022
    affected < 5.14.0-162.12.1.el9_1fixed 5.14.0-162.12.1.el9_1

    A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a lo

  • CVE-2022-2873Aug 22, 2022
    affected < 5.14.0-162.18.1.el9_1fixed 5.14.0-162.18.1.el9_1

    An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.

  • CVE-2022-26373Aug 18, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

  • CVE-2022-20368Aug 11, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel

  • CVE-2022-1012Aug 5, 2022
    affected < 5.14.0-70.17.1.el9_0fixed 5.14.0-70.17.1.el9_0

    A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.

  • CVE-2022-36946Jul 27, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.

  • CVE-2021-33655Jul 18, 2022
    affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2

    When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.

  • CVE-2022-23825Jul 14, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.

  • CVE-2022-29900Jul 12, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

  • CVE-2022-29901Jul 12, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code exe

  • CVE-2022-33743Jul 5, 2022
    affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2

    network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.

  • CVE-2022-34918Jul 4, 2022
    affected < 5.14.0-70.26.1.el9_0fixed 5.14.0-70.26.1.el9_0

    An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but

  • CVE-2022-1852Jun 30, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.

  • CVE-2022-2078Jun 30, 2022
    affected < 5.14.0-70.26.1.el9_0fixed 5.14.0-70.26.1.el9_0

    A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.

  • CVE-2022-21166Jun 15, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2022-21125Jun 15, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2022-21123Jun 15, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2022-20141Jun 15, 2022
    affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2

    In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product

  • CVE-2022-21499Jun 9, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Scor

  • CVE-2022-1998Jun 9, 2022
    affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1

    A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.