VYPR

rpm package

suse/kernel-livepatch-SLE15-SP4_Update_0&distro=SUSE Linux Enterprise Live Patching 15 SP4

pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_0&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4

Vulnerabilities (54)

  • CVE-2022-3586Oct 19, 2022
    affected < 9-150400.4.24.1fixed 9-150400.4.24.1

    A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to cra

  • CVE-2022-3564Oct 17, 2022
    affected < 11-150400.7.2fixed 11-150400.7.2

    A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to

  • CVE-2022-3545Oct 17, 2022
    affected < 9-150400.4.24.1fixed 9-150400.4.24.1

    A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is re

  • CVE-2022-42722Oct 13, 2022
    affected < 8-150400.4.21.1fixed 8-150400.4.21.1

    In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.

  • CVE-2022-42721Oct 13, 2022
    affected < 7-150400.4.18.3fixed 7-150400.4.18.3

    A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.

  • CVE-2022-42720Oct 13, 2022
    affected < 7-150400.4.18.3fixed 7-150400.4.18.3

    Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.

  • CVE-2022-42719Oct 13, 2022
    affected < 7-150400.4.18.3fixed 7-150400.4.18.3

    A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.

  • CVE-2022-41674Oct 13, 2022
    affected < 7-150400.4.18.3fixed 7-150400.4.18.3

    An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.

  • CVE-2022-42703Oct 9, 2022
    affected < 8-150400.4.21.1fixed 8-150400.4.21.1

    mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.

  • CVE-2022-41218Sep 21, 2022
    affected < 9-150400.4.24.1fixed 9-150400.4.24.1

    In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.

  • CVE-2022-39189Sep 2, 2022
    affected < 7-150400.4.18.3fixed 7-150400.4.18.3

    An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.

  • CVE-2022-39188Sep 2, 2022
    affected < 6-150400.4.15.3fixed 6-150400.4.15.3

    An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.

  • CVE-2022-1729Sep 1, 2022
    affected < 3-150400.4.6.2fixed 3-150400.4.6.2

    A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

  • CVE-2022-1016Aug 29, 2022
    affected < 2-150400.4.3.3fixed 2-150400.4.3.3

    A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.

  • CVE-2022-2959Aug 25, 2022
    affected < 8-150400.4.21.1fixed 8-150400.4.21.1

    A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a lo

  • CVE-2022-36946Jul 27, 2022
    affected < 5-150400.4.12.3fixed 5-150400.4.12.3

    nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.

  • CVE-2021-33655Jul 18, 2022
    affected < 8-150400.4.21.1fixed 8-150400.4.21.1

    When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.

  • CVE-2022-33743Jul 5, 2022
    affected < 4-150400.4.9.3fixed 4-150400.4.9.3

    network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.

  • CVE-2022-34918Jul 4, 2022
    affected < 4-150400.4.9.3fixed 4-150400.4.9.3

    An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but

  • CVE-2022-20154Jun 15, 2022
    affected < 3-150400.4.6.2fixed 3-150400.4.6.2

    In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: