VYPR

rpm package

suse/kernel-rt&distro=SUSE Real Time Module 15 SP4

pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP4

Vulnerabilities (277)

  • CVE-2022-3105Dec 14, 2022
    affected < 5.14.21-150400.15.8.1fixed 5.14.21-150400.15.8.1

    An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().

  • CVE-2022-3104Dec 14, 2022
    affected < 5.14.21-150400.15.8.1fixed 5.14.21-150400.15.8.1

    An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.

  • CVE-2022-42329Dec 7, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free

  • CVE-2022-42328Dec 7, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free

  • CVE-2022-3643Dec 7, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux networ

  • CVE-2022-4269Dec 5, 2022
    affected < 5.14.21-150400.15.37.2fixed 5.14.21-150400.15.37.2

    A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in

  • CVE-2022-45869Nov 30, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.

  • CVE-2022-4129Nov 28, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.

  • CVE-2022-45934Nov 27, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.

  • CVE-2022-45919Nov 27, 2022
    affected < 5.14.21-150400.15.37.2fixed 5.14.21-150400.15.37.2

    An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.

  • CVE-2022-45888Nov 25, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.

  • CVE-2022-45887Nov 25, 2022
    affected < 5.14.21-150400.15.37.2fixed 5.14.21-150400.15.37.2

    An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.

  • CVE-2022-45886Nov 25, 2022
    affected < 5.14.21-150400.15.37.2fixed 5.14.21-150400.15.37.2

    An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.

  • CVE-2022-45885Nov 25, 2022
    affected < 5.14.21-150400.15.37.2fixed 5.14.21-150400.15.37.2

    An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.

  • CVE-2022-45884Nov 25, 2022
    affected < 5.14.21-150400.15.37.2fixed 5.14.21-150400.15.37.2

    An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.

  • CVE-2022-42896Nov 23, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leakin

  • CVE-2022-42895Nov 23, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit  https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba31

  • CVE-2022-3903Nov 14, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the syst

  • CVE-2022-43945HigNov 4, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client c

  • CVE-2022-43750Oct 26, 2022
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.

Page 10 of 14