rpm package
suse/kernel-rt&distro=SUSE Real Time Module 15 SP4
pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP4
Vulnerabilities (277)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-26373 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Aug 18, 2022 | Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. | ||
| CVE-2022-20368 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Aug 11, 2022 | Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel | ||
| CVE-2022-20369 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Aug 11, 2022 | In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: An | ||
| CVE-2022-36879 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Jul 27, 2022 | An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice. | ||
| CVE-2022-36946 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Jul 27, 2022 | nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len. | ||
| CVE-2022-33981 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Jun 18, 2022 | drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function. | ||
| CVE-2022-32296 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Jun 5, 2022 | The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056. | ||
| CVE-2022-32250 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Jun 2, 2022 | net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free. | ||
| CVE-2022-1882 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | May 26, 2022 | A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on t | ||
| CVE-2021-33135 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | May 12, 2022 | Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access. | ||
| CVE-2022-28356 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Apr 2, 2022 | In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c. | ||
| CVE-2020-36516 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Feb 26, 2022 | An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session. | ||
| CVE-2020-26555 | — | < 5.14.21-150400.15.65.1 | 5.14.21-150400.15.65.1 | May 24, 2021 | Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN. | ||
| CVE-2020-24588 | Low | 3.5 | < 5.14.21-150400.15.11.1 | 5.14.21-150400.15.11.1 | May 11, 2021 | The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is manda | |
| CVE-2020-16119 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Jan 14, 2021 | Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0 | ||
| CVE-2017-5753 | — | < 5.14.21-150400.15.23.1 | 5.14.21-150400.15.23.1 | Jan 4, 2018 | Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | ||
| CVE-2016-3695 | Med | 5.5 | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Dec 29, 2017 | The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set. |
- CVE-2022-26373Aug 18, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
- CVE-2022-20368Aug 11, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel
- CVE-2022-20369Aug 11, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: An
- CVE-2022-36879Jul 27, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.
- CVE-2022-36946Jul 27, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
- CVE-2022-33981Jun 18, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.
- CVE-2022-32296Jun 5, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.
- CVE-2022-32250Jun 2, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
- CVE-2022-1882May 26, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on t
- CVE-2021-33135May 12, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.
- CVE-2022-28356Apr 2, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.
- CVE-2020-36516Feb 26, 2022affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.
- CVE-2020-26555May 24, 2021affected < 5.14.21-150400.15.65.1fixed 5.14.21-150400.15.65.1
Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
- affected < 5.14.21-150400.15.11.1fixed 5.14.21-150400.15.11.1
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is manda
- CVE-2020-16119Jan 14, 2021affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0
- CVE-2017-5753Jan 4, 2018affected < 5.14.21-150400.15.23.1fixed 5.14.21-150400.15.23.1
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
- affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.
Page 14 of 14