VYPR

rpm package

suse/kernel-default-base&distro=SUSE Linux Enterprise Module for Basesystem 15 SP4

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4

Vulnerabilities (314)

  • CVE-2022-21166Jun 15, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2022-21127Jun 15, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2022-21125Jun 15, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2022-21123Jun 15, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2022-20154Jun 15, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:

  • CVE-2022-20132Jun 15, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges n

  • CVE-2022-21499Jun 9, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Scor

  • CVE-2022-1998Jun 9, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.

  • CVE-2022-32296Jun 5, 2022
    affected < 5.14.21-150400.24.28.1.150400.24.9.5fixed 5.14.21-150400.24.28.1.150400.24.9.5

    The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.

  • CVE-2022-32250Jun 2, 2022
    affected < 5.14.21-150400.24.21.2.150400.24.7.2fixed 5.14.21-150400.24.21.2.150400.24.7.2

    net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.

  • CVE-2022-1789May 31, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.

  • CVE-2022-1652May 31, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a

  • CVE-2022-1462May 31, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local u

  • CVE-2022-1882May 26, 2022
    affected < 5.14.21-150400.24.33.2.150400.24.11.4fixed 5.14.21-150400.24.33.2.150400.24.11.4

    A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on t

  • CVE-2022-1734May 18, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.

  • CVE-2022-29581May 17, 2022
    affected < 5.14.21-150400.24.18.1.150400.24.5.4fixed 5.14.21-150400.24.18.1.150400.24.5.4

    Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.

  • CVE-2022-1679May 16, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.

  • CVE-2021-33135May 12, 2022
    affected < 5.14.21-150400.24.21.2.150400.24.7.2fixed 5.14.21-150400.24.21.2.150400.24.7.2

    Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.

  • CVE-2022-30594May 12, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.

  • CVE-2022-29582Apr 22, 2022
    affected < 5.14.21-150400.24.11.1.150400.24.3.6fixed 5.14.21-150400.24.11.1.150400.24.3.6

    In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.

Page 15 of 16