VYPR

rpm package

suse/kernel-livepatch-SLE15-SP3_Update_4&distro=SUSE Linux Enterprise Live Patching 15 SP3

pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3

Vulnerabilities (46)

  • CVE-2022-0516Mar 8, 2022
    affected < 9-150300.2.1fixed 9-150300.2.1

    A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions pri

  • CVE-2021-3656Mar 4, 2022
    affected < 3-2.3fixed 3-2.3

    A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue c

  • CVE-2021-3640Mar 3, 2022
    affected < 4-2.1fixed 4-2.1

    A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable fau

  • CVE-2021-3609Mar 3, 2022
    affected < 2-2.1fixed 2-2.1

    .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege e

  • CVE-2022-0492Mar 3, 2022
    affected < 10-150300.2.1fixed 10-150300.2.1

    A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpecte

  • CVE-2022-25636Feb 22, 2022
    affected < 10-150300.2.1fixed 10-150300.2.1

    net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.

  • CVE-2021-20322Feb 18, 2022
    affected < 6-2.1fixed 6-2.1

    A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomizat

  • CVE-2022-0185KEVFeb 11, 2022
    affected < 7-150300.2.2fixed 7-150300.2.2

    A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced

  • CVE-2022-0487Feb 4, 2022
    affected < 10-150300.2.1fixed 10-150300.2.1

    A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.

  • CVE-2021-4154Feb 4, 2022
    affected < 7-150300.2.2fixed 7-150300.2.2

    A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a

  • CVE-2021-22600KEVJan 26, 2022
    affected < 9-150300.2.1fixed 9-150300.2.1

    A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

  • CVE-2021-34866Jan 25, 2022
    affected < 5-2.2fixed 5-2.2

    This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists with

  • CVE-2021-4001Jan 21, 2022
    affected < 10-150300.2.1fixed 10-150300.2.1

    A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space.

  • CVE-2021-4083Jan 18, 2022
    affected < 8-150300.2.2fixed 8-150300.2.2

    A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalat

  • CVE-2021-0920KEVDec 15, 2021
    affected < 9-150300.2.1fixed 9-150300.2.1

    In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndro

  • CVE-2021-42739Oct 20, 2021
    affected < 7-150300.2.2fixed 7-150300.2.2

    The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.

  • CVE-2021-41864Oct 1, 2021
    affected < 5-2.2fixed 5-2.2

    prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.

  • CVE-2021-3653Sep 29, 2021
    affected < 3-2.3fixed 3-2.3

    A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue co

  • CVE-2021-3573Aug 13, 2021
    affected < 4-2.1fixed 4-2.1

    A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blackl

  • CVE-2021-38198Aug 8, 2021
    affected < 3-2.3fixed 3-2.3

    arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.