VYPR

rpm package

suse/kernel-livepatch-SLE15-SP4_Update_6&distro=SUSE Linux Enterprise Live Patching 15 SP4

pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4

Vulnerabilities (47)

  • CVE-2022-4095Mar 22, 2023
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.

  • CVE-2023-28466Mar 15, 2023
    affected < 7-150400.2.3fixed 7-150400.2.3

    do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).

  • CVE-2022-3707Mar 6, 2023
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.

  • CVE-2023-1118Mar 2, 2023
    affected < 5-150400.2.2fixed 5-150400.2.2

    A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.

  • CVE-2023-0461Feb 28, 2023
    affected < 6-150400.2.3fixed 6-150400.2.3

    There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege

  • CVE-2022-4139Jan 27, 2023
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.

  • CVE-2022-41858Jan 17, 2023
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.

  • CVE-2023-23455Jan 12, 2023
    affected < 7-150400.2.3fixed 7-150400.2.3

    atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).

  • CVE-2023-23454Jan 12, 2023
    affected < 6-150400.2.3fixed 6-150400.2.3

    cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).

  • CVE-2022-4379Jan 10, 2023
    affected < 2-150400.2.1fixed 2-150400.2.1

    A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial

  • CVE-2022-4378Jan 5, 2023
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

  • CVE-2022-42329Dec 7, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free

  • CVE-2022-42328Dec 7, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free

  • CVE-2022-3643Dec 7, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux networ

  • CVE-2022-45869Nov 30, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.

  • CVE-2022-4129Nov 28, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.

  • CVE-2022-45934Nov 27, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.

  • CVE-2022-45888Nov 25, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.

  • CVE-2022-42896Nov 23, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leakin

  • CVE-2022-42895Nov 23, 2022
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit  https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba31