rpm package
almalinux/kernel-devel-matched
pkg:rpm/almalinux/kernel-devel-matched
Vulnerabilities (782)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-2959 | — | < 5.14.0-162.12.1.el9_1 | 5.14.0-162.12.1.el9_1 | Aug 25, 2022 | A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a lo | ||
| CVE-2022-2873 | — | < 5.14.0-162.18.1.el9_1 | 5.14.0-162.18.1.el9_1 | Aug 22, 2022 | An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. | ||
| CVE-2022-26373 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Aug 18, 2022 | Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. | ||
| CVE-2022-20368 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Aug 11, 2022 | Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel | ||
| CVE-2022-1012 | — | < 5.14.0-70.17.1.el9_0 | 5.14.0-70.17.1.el9_0 | Aug 5, 2022 | A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem. | ||
| CVE-2022-36946 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Jul 27, 2022 | nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len. | ||
| CVE-2021-33655 | — | < 5.14.0-284.11.1.el9_2 | 5.14.0-284.11.1.el9_2 | Jul 18, 2022 | When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds. | ||
| CVE-2022-23825 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Jul 14, 2022 | Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure. | ||
| CVE-2022-29900 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Jul 12, 2022 | Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions. | ||
| CVE-2022-29901 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Jul 12, 2022 | Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code exe | ||
| CVE-2022-33743 | — | < 5.14.0-284.11.1.el9_2 | 5.14.0-284.11.1.el9_2 | Jul 5, 2022 | network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed. | ||
| CVE-2022-34918 | — | < 5.14.0-70.26.1.el9_0 | 5.14.0-70.26.1.el9_0 | Jul 4, 2022 | An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but | ||
| CVE-2022-1852 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Jun 30, 2022 | A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU. | ||
| CVE-2022-2078 | — | < 5.14.0-70.26.1.el9_0 | 5.14.0-70.26.1.el9_0 | Jun 30, 2022 | A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code. | ||
| CVE-2022-21166 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Jun 15, 2022 | Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | ||
| CVE-2022-21125 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Jun 15, 2022 | Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | ||
| CVE-2022-21123 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Jun 15, 2022 | Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | ||
| CVE-2022-20141 | — | < 5.14.0-284.11.1.el9_2 | 5.14.0-284.11.1.el9_2 | Jun 15, 2022 | In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product | ||
| CVE-2022-21499 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Jun 9, 2022 | KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Scor | ||
| CVE-2022-1998 | — | < 5.14.0-162.6.1.el9_1 | 5.14.0-162.6.1.el9_1 | Jun 9, 2022 | A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system. |
- CVE-2022-2959Aug 25, 2022affected < 5.14.0-162.12.1.el9_1fixed 5.14.0-162.12.1.el9_1
A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a lo
- CVE-2022-2873Aug 22, 2022affected < 5.14.0-162.18.1.el9_1fixed 5.14.0-162.18.1.el9_1
An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.
- CVE-2022-26373Aug 18, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
- CVE-2022-20368Aug 11, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel
- CVE-2022-1012Aug 5, 2022affected < 5.14.0-70.17.1.el9_0fixed 5.14.0-70.17.1.el9_0
A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.
- CVE-2022-36946Jul 27, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
- CVE-2021-33655Jul 18, 2022affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2
When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.
- CVE-2022-23825Jul 14, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.
- CVE-2022-29900Jul 12, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.
- CVE-2022-29901Jul 12, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code exe
- CVE-2022-33743Jul 5, 2022affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2
network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.
- CVE-2022-34918Jul 4, 2022affected < 5.14.0-70.26.1.el9_0fixed 5.14.0-70.26.1.el9_0
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but
- CVE-2022-1852Jun 30, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.
- CVE-2022-2078Jun 30, 2022affected < 5.14.0-70.26.1.el9_0fixed 5.14.0-70.26.1.el9_0
A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.
- CVE-2022-21166Jun 15, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2022-21125Jun 15, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2022-21123Jun 15, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2022-20141Jun 15, 2022affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2
In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product
- CVE-2022-21499Jun 9, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Scor
- CVE-2022-1998Jun 9, 2022affected < 5.14.0-162.6.1.el9_1fixed 5.14.0-162.6.1.el9_1
A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
Page 38 of 40