VYPR

rpm package

suse/kernel-livepatch-SLE15-SP5_Update_25&distro=SUSE Linux Enterprise Live Patching 15 SP5

pkg:rpm/suse/kernel-livepatch-SLE15-SP5_Update_25&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5

Vulnerabilities (633)

  • CVE-2023-1652HigMar 29, 2023
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.

  • CVE-2023-0179Mar 27, 2023
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.

  • CVE-2022-3435Oct 8, 2022
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is

  • CVE-2022-3303Sep 27, 2022
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system,

  • CVE-2022-2977Sep 14, 2022
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate priv

  • CVE-2022-1016Aug 29, 2022
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.

  • CVE-2022-1184Aug 29, 2022
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel’s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.

  • CVE-2022-0168Aug 26, 2022
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    A denial of service (DOS) issue was found in the Linux kernel’s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to cr

  • CVE-2022-29900Jul 12, 2022
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

  • CVE-2022-29901Jul 12, 2022
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code exe

  • CVE-2022-1048Apr 29, 2022
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalat

  • CVE-2022-0995Mar 25, 2022
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.

  • CVE-2017-5753Jan 4, 2018
    affected < 1-150500.11.3.1fixed 1-150500.11.3.1

    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Page 32 of 32