VYPR

rpm package

suse/kernel-livepatch-SLE15-SP3_Update_11&distro=SUSE Linux Enterprise Live Patching 15 SP3

pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_11&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3

Vulnerabilities (67)

  • CVE-2022-0435Mar 25, 2022
    affected < 3-150300.2.2fixed 3-150300.2.2

    A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate

  • CVE-2022-0330Mar 25, 2022
    affected < 8-150300.2.1fixed 8-150300.2.1

    A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.

  • CVE-2022-27666Mar 23, 2022
    affected < 6-150300.2.1fixed 6-150300.2.1

    A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.

  • CVE-2022-1011Mar 18, 2022
    affected < 7-150300.2.1fixed 7-150300.2.1

    A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.

  • CVE-2021-39698Mar 16, 2022
    affected < 6-150300.2.1fixed 6-150300.2.1

    In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android ke

  • CVE-2022-0516Mar 8, 2022
    affected < 4-150300.2.1fixed 4-150300.2.1

    A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions pri

  • CVE-2022-26490Mar 6, 2022
    affected < 13-150300.2.2fixed 13-150300.2.2

    st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.

  • CVE-2021-4002Mar 3, 2022
    affected < 1-7.3.1fixed 1-7.3.1

    A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized acces

  • CVE-2022-0492Mar 3, 2022
    affected < 5-150300.2.1fixed 5-150300.2.1

    A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpecte

  • CVE-2020-36516Feb 26, 2022
    affected < 14-150300.2.2fixed 14-150300.2.2

    An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.

  • CVE-2022-25636Feb 22, 2022
    affected < 5-150300.2.1fixed 5-150300.2.1

    net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.

  • CVE-2022-0185KEVFeb 11, 2022
    affected < 2-150300.2.2fixed 2-150300.2.2

    A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced

  • CVE-2021-22600KEVJan 26, 2022
    affected < 4-150300.2.1fixed 4-150300.2.1

    A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

  • CVE-2021-4001Jan 21, 2022
    affected < 1-7.3.1fixed 1-7.3.1

    A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space.

  • CVE-2021-4083Jan 18, 2022
    affected < 3-150300.2.2fixed 3-150300.2.2

    A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalat

  • CVE-2021-28715Jan 6, 2022
    affected < 1-7.3.1fixed 1-7.3.1

    Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are b

  • CVE-2021-28714Jan 6, 2022
    affected < 1-7.3.1fixed 1-7.3.1

    Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are b

  • CVE-2021-28713Jan 5, 2022
    affected < 1-7.3.1fixed 1-7.3.1

    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically re

  • CVE-2021-28712Jan 5, 2022
    affected < 1-7.3.1fixed 1-7.3.1

    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically re

  • CVE-2021-28711Jan 5, 2022
    affected < 1-7.3.1fixed 1-7.3.1

    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically re