VYPR

rpm package

suse/kernel-livepatch-SLE15-SP3_Update_15&distro=SUSE Linux Enterprise Live Patching 15 SP3

pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_15&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3

Vulnerabilities (54)

  • CVE-2022-1055Mar 29, 2022
    affected < 4-150300.2.1fixed 4-150300.2.1

    A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5

  • CVE-2022-27666Mar 23, 2022
    affected < 3-150300.2.1fixed 3-150300.2.1

    A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.

  • CVE-2022-1011Mar 18, 2022
    affected < 4-150300.2.1fixed 4-150300.2.1

    A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.

  • CVE-2021-39698Mar 16, 2022
    affected < 3-150300.2.1fixed 3-150300.2.1

    In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android ke

  • CVE-2022-0002Mar 11, 2022
    affected < 1-150300.7.5.1fixed 1-150300.7.5.1

    Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

  • CVE-2022-0001Mar 11, 2022
    affected < 1-150300.7.5.1fixed 1-150300.7.5.1

    Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

  • CVE-2022-0516Mar 8, 2022
    affected < 1-150300.7.5.1fixed 1-150300.7.5.1

    A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions pri

  • CVE-2022-0847KEVMar 7, 2022
    affected < 1-150300.7.5.1fixed 1-150300.7.5.1

    A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to

  • CVE-2022-26490Mar 6, 2022
    affected < 10-150300.2.2fixed 10-150300.2.2

    st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.

  • CVE-2022-0492Mar 3, 2022
    affected < 1-150300.7.5.1fixed 1-150300.7.5.1

    A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpecte

  • CVE-2020-36516Feb 26, 2022
    affected < 11-150300.2.2fixed 11-150300.2.2

    An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.

  • CVE-2022-25636Feb 22, 2022
    affected < 2-150300.2.1fixed 2-150300.2.1

    net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.

  • CVE-2022-25375Feb 20, 2022
    affected < 1-150300.7.5.1fixed 1-150300.7.5.1

    An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.

  • CVE-2021-0920KEVDec 15, 2021
    affected < 2-150300.2.1fixed 2-150300.2.1

    In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndro

Page 3 of 3