VYPR

rpm package

suse/kernel-livepatch-SLE15-SP4_Update_3&distro=SUSE Linux Enterprise Live Patching 15 SP4

pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4

Vulnerabilities (59)

  • CVE-2022-39188Sep 2, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.

  • CVE-2022-3078Sep 1, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.

  • CVE-2022-2639Sep 1, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an

  • CVE-2022-2663Sep 1, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.

  • CVE-2022-3028Aug 31, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory

  • CVE-2022-2959Aug 25, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a lo

  • CVE-2021-4037Aug 24, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a direct

  • CVE-2022-2938Aug 23, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.

  • CVE-2022-2873Aug 22, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.

  • CVE-2022-20368Aug 11, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel

  • CVE-2022-20369Aug 11, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: An

  • CVE-2022-36879Jul 27, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.

  • CVE-2022-36946Jul 27, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.

  • CVE-2022-32250Jun 2, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.

  • CVE-2021-33135May 12, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.

  • CVE-2022-28356Apr 2, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.

  • CVE-2021-39698Mar 16, 2022
    affected < 2-150400.2.2fixed 2-150400.2.2

    In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android ke

  • CVE-2020-36516Feb 26, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.

  • CVE-2016-3695MedDec 29, 2017
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.

Page 3 of 3