rpm package
almalinux/kernel-rt-kvm
pkg:rpm/almalinux/kernel-rt-kvm
Vulnerabilities (523)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-0179 | — | < 5.14.0-162.18.1.rt21.181.el9_1 | 5.14.0-162.18.1.rt21.181.el9_1 | Mar 27, 2023 | A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution. | ||
| CVE-2023-0590 | — | < 5.14.0-284.11.1.rt14.296.el9_2 | 5.14.0-284.11.1.rt14.296.el9_2 | Mar 23, 2023 | A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected. | ||
| CVE-2023-1281 | — | < 4.18.0-477.21.1.rt7.284.el8_8 | 4.18.0-477.21.1.rt7.284.el8_8 | Mar 22, 2023 | Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A l | ||
| CVE-2023-0386 | — | KEV | < 4.18.0-425.19.2.rt7.230.el8_7 | 4.18.0-425.19.2.rt7.230.el8_7 | Mar 22, 2023 | A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a loca | |
| CVE-2023-28466 | — | < 5.14.0-284.18.1.rt14.303.el9_2 | 5.14.0-284.18.1.rt14.303.el9_2 | Mar 15, 2023 | do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). | ||
| CVE-2022-3707 | — | < 5.14.0-284.11.1.rt14.296.el9_2 | 5.14.0-284.11.1.rt14.296.el9_2 | Mar 6, 2023 | A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system. | ||
| CVE-2022-3424 | — | < 5.14.0-570.19.1.el9_6 | 5.14.0-570.19.1.el9_6 | Mar 6, 2023 | A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate | ||
| CVE-2023-0461 | — | < 5.14.0-284.11.1.rt14.296.el9_2 | 5.14.0-284.11.1.rt14.296.el9_2 | Feb 28, 2023 | There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege | ||
| CVE-2023-0266 | — | KEV | < 5.14.0-162.22.2.rt21.186.el9_1 | 5.14.0-162.22.2.rt21.186.el9_1 | Jan 30, 2023 | A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgradin | |
| CVE-2022-4139 | — | < 4.18.0-425.10.1.rt7.220.el8_7 | 4.18.0-425.10.1.rt7.220.el8_7 | Jan 27, 2023 | An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system. | ||
| CVE-2023-0394 | — | < 5.14.0-284.11.1.rt14.296.el9_2 | 5.14.0-284.11.1.rt14.296.el9_2 | Jan 24, 2023 | A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash. | ||
| CVE-2022-47929 | — | < 5.14.0-284.11.1.rt14.296.el9_2 | 5.14.0-284.11.1.rt14.296.el9_2 | Jan 17, 2023 | In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This aff | ||
| CVE-2023-23454 | — | < 4.18.0-477.10.1.rt7.274.el8_8 | 4.18.0-477.10.1.rt7.274.el8_8 | Jan 12, 2023 | cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results). | ||
| CVE-2022-3628 | — | < 5.14.0-284.11.1.rt14.296.el9_2 | 5.14.0-284.11.1.rt14.296.el9_2 | Jan 12, 2023 | A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges. | ||
| CVE-2022-4379 | — | < 5.14.0-162.18.1.rt21.181.el9_1 | 5.14.0-162.18.1.rt21.181.el9_1 | Jan 10, 2023 | A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial | ||
| CVE-2022-2196 | — | < 5.14.0-284.11.1.rt14.296.el9_2 | 5.14.0-284.11.1.rt14.296.el9_2 | Jan 9, 2023 | A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker a | ||
| CVE-2022-4378 | — | < 5.14.0-162.18.1.rt21.181.el9_1 | 5.14.0-162.18.1.rt21.181.el9_1 | Jan 5, 2023 | A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. | ||
| CVE-2022-4269 | — | < 5.14.0-162.22.2.rt21.186.el9_1 | 5.14.0-162.22.2.rt21.186.el9_1 | Dec 5, 2022 | A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in | ||
| CVE-2022-45869 | — | < 5.14.0-284.25.1.rt14.310.el9_2 | 5.14.0-284.25.1.rt14.310.el9_2 | Nov 30, 2022 | A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled. | ||
| CVE-2022-4129 | — | < 5.14.0-284.11.1.rt14.296.el9_2 | 5.14.0-284.11.1.rt14.296.el9_2 | Nov 28, 2022 | A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service. |
- CVE-2023-0179Mar 27, 2023affected < 5.14.0-162.18.1.rt21.181.el9_1fixed 5.14.0-162.18.1.rt21.181.el9_1
A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.
- CVE-2023-0590Mar 23, 2023affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2
A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.
- CVE-2023-1281Mar 22, 2023affected < 4.18.0-477.21.1.rt7.284.el8_8fixed 4.18.0-477.21.1.rt7.284.el8_8
Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A l
- affected < 4.18.0-425.19.2.rt7.230.el8_7fixed 4.18.0-425.19.2.rt7.230.el8_7
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a loca
- CVE-2023-28466Mar 15, 2023affected < 5.14.0-284.18.1.rt14.303.el9_2fixed 5.14.0-284.18.1.rt14.303.el9_2
do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).
- CVE-2022-3707Mar 6, 2023affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2
A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.
- CVE-2022-3424Mar 6, 2023affected < 5.14.0-570.19.1.el9_6fixed 5.14.0-570.19.1.el9_6
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate
- CVE-2023-0461Feb 28, 2023affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege
- affected < 5.14.0-162.22.2.rt21.186.el9_1fixed 5.14.0-162.22.2.rt21.186.el9_1
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgradin
- CVE-2022-4139Jan 27, 2023affected < 4.18.0-425.10.1.rt7.220.el8_7fixed 4.18.0-425.10.1.rt7.220.el8_7
An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.
- CVE-2023-0394Jan 24, 2023affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2
A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
- CVE-2022-47929Jan 17, 2023affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2
In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This aff
- CVE-2023-23454Jan 12, 2023affected < 4.18.0-477.10.1.rt7.274.el8_8fixed 4.18.0-477.10.1.rt7.274.el8_8
cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
- CVE-2022-3628Jan 12, 2023affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2
A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.
- CVE-2022-4379Jan 10, 2023affected < 5.14.0-162.18.1.rt21.181.el9_1fixed 5.14.0-162.18.1.rt21.181.el9_1
A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial
- CVE-2022-2196Jan 9, 2023affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2
A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker a
- CVE-2022-4378Jan 5, 2023affected < 5.14.0-162.18.1.rt21.181.el9_1fixed 5.14.0-162.18.1.rt21.181.el9_1
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
- CVE-2022-4269Dec 5, 2022affected < 5.14.0-162.22.2.rt21.186.el9_1fixed 5.14.0-162.22.2.rt21.186.el9_1
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in
- CVE-2022-45869Nov 30, 2022affected < 5.14.0-284.25.1.rt14.310.el9_2fixed 5.14.0-284.25.1.rt14.310.el9_2
A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.
- CVE-2022-4129Nov 28, 2022affected < 5.14.0-284.11.1.rt14.296.el9_2fixed 5.14.0-284.11.1.rt14.296.el9_2
A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.
Page 22 of 27