VYPR

rpm package

suse/kernel-livepatch-SLE15-SP3_Update_6&distro=SUSE Linux Enterprise Live Patching 15 SP3

pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3

Vulnerabilities (63)

  • CVE-2022-1280Apr 13, 2022
    affected < 11-150300.2.1fixed 11-150300.2.1

    A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.

  • CVE-2022-28389Apr 3, 2022
    affected < 15-150300.2.2fixed 15-150300.2.2

    mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.

  • CVE-2022-28390Apr 3, 2022
    affected < 15-150300.2.2fixed 15-150300.2.2

    ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.

  • CVE-2022-1055Mar 29, 2022
    affected < 9-150300.2.1fixed 9-150300.2.1

    A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5

  • CVE-2021-4202Mar 25, 2022
    affected < 5-150300.2.2fixed 5-150300.2.2

    A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalat

  • CVE-2022-0435Mar 25, 2022
    affected < 5-150300.2.2fixed 5-150300.2.2

    A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate

  • CVE-2022-0330Mar 25, 2022
    affected < 10-150300.2.1fixed 10-150300.2.1

    A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.

  • CVE-2022-27666Mar 23, 2022
    affected < 8-150300.2.1fixed 8-150300.2.1

    A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.

  • CVE-2022-1011Mar 18, 2022
    affected < 9-150300.2.1fixed 9-150300.2.1

    A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.

  • CVE-2021-39698Mar 16, 2022
    affected < 8-150300.2.1fixed 8-150300.2.1

    In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android ke

  • CVE-2022-0516Mar 8, 2022
    affected < 6-150300.2.1fixed 6-150300.2.1

    A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions pri

  • CVE-2021-3739Mar 7, 2022
    affected < 1-7.5.1fixed 1-7.5.1

    A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires ‘CAP_SYS_ADMIN’. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat fr

  • CVE-2021-3732Mar 7, 2022
    affected < 1-7.5.1fixed 1-7.5.1

    A flaw was found in the Linux kernel's OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.

  • CVE-2022-26490Mar 6, 2022
    affected < 15-150300.2.2fixed 15-150300.2.2

    st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.

  • CVE-2021-3656Mar 4, 2022
    affected < 1-7.5.1fixed 1-7.5.1

    A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue c

  • CVE-2021-3743Mar 4, 2022
    affected < 1-7.5.1fixed 1-7.5.1

    An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat

  • CVE-2021-3640Mar 3, 2022
    affected < 1-7.5.1fixed 1-7.5.1

    A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable fau

  • CVE-2022-0492Mar 3, 2022
    affected < 7-150300.2.1fixed 7-150300.2.1

    A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpecte

  • CVE-2020-36516Feb 26, 2022
    affected < 16-150300.2.2fixed 16-150300.2.2

    An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.

  • CVE-2022-25636Feb 22, 2022
    affected < 7-150300.2.1fixed 7-150300.2.1

    net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.