VYPR

rpm package

almalinux/kernel-rt-core

pkg:rpm/almalinux/kernel-rt-core

Vulnerabilities (1,061)

  • CVE-2022-39190Sep 2, 2022
    affected < 5.14.0-162.6.1.rt21.168.el9_1fixed 5.14.0-162.6.1.rt21.168.el9_1

    An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.

  • CVE-2022-39189Sep 2, 2022
    affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2

    An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.

  • CVE-2022-39188Sep 2, 2022
    affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2

    An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.

  • CVE-2022-2639Sep 1, 2022
    affected < 4.18.0-425.3.1.rt7.213.el8fixed 4.18.0-425.3.1.rt7.213.el8

    An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an

  • CVE-2022-2663Sep 1, 2022
    affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2

    An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.

  • CVE-2022-1729Sep 1, 2022
    affected < 5.14.0-70.17.1.rt21.89.el9_0fixed 5.14.0-70.17.1.rt21.89.el9_0

    A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

  • CVE-2022-3028Aug 31, 2022
    affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2

    A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory

  • CVE-2022-1016Aug 29, 2022
    affected < 4.18.0-425.3.1.rt7.213.el8fixed 4.18.0-425.3.1.rt7.213.el8

    A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.

  • CVE-2022-0480Aug 29, 2022
    affected < 5.14.0-427.13.1.el9_4fixed 5.14.0-427.13.1.el9_4

    A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.

  • CVE-2022-1184Aug 29, 2022
    affected < 4.18.0-425.3.1.rt7.213.el8fixed 4.18.0-425.3.1.rt7.213.el8

    A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel’s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.

  • CVE-2022-0168Aug 26, 2022
    affected < 4.18.0-425.3.1.rt7.213.el8fixed 4.18.0-425.3.1.rt7.213.el8

    A denial of service (DOS) issue was found in the Linux kernel’s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to cr

  • CVE-2022-2959Aug 25, 2022
    affected < 5.14.0-162.12.1.rt21.175.el9_1fixed 5.14.0-162.12.1.rt21.175.el9_1

    A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a lo

  • CVE-2022-2938Aug 23, 2022
    affected < 4.18.0-425.3.1.rt7.213.el8fixed 4.18.0-425.3.1.rt7.213.el8

    A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.

  • CVE-2022-2873Aug 22, 2022
    affected < 4.18.0-425.13.1.rt7.223.el8_7fixed 4.18.0-425.13.1.rt7.223.el8_7

    An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.

  • CVE-2022-26373Aug 18, 2022
    affected < 4.18.0-425.3.1.rt7.213.el8fixed 4.18.0-425.3.1.rt7.213.el8

    Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

  • CVE-2022-20368Aug 11, 2022
    affected < 4.18.0-425.3.1.rt7.213.el8fixed 4.18.0-425.3.1.rt7.213.el8

    Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel

  • CVE-2022-1012Aug 5, 2022
    affected < 5.14.0-70.17.1.rt21.89.el9_0fixed 5.14.0-70.17.1.rt21.89.el9_0

    A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.

  • CVE-2022-36946Jul 27, 2022
    affected < 4.18.0-425.3.1.rt7.213.el8fixed 4.18.0-425.3.1.rt7.213.el8

    nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.

  • CVE-2020-36558Jul 21, 2022
    affected < 4.18.0-425.3.1.rt7.213.el8fixed 4.18.0-425.3.1.rt7.213.el8

    A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault.

  • CVE-2021-33655Jul 18, 2022
    affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2

    When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.

Page 51 of 54