rpm package
suse/kernel-source&distro=SUSE Manager Retail Branch Server 4.2
pkg:rpm/suse/kernel-source&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.2
Vulnerabilities (40)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-3106 | — | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Dec 14, 2022 | An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc(). | ||
| CVE-2022-3105 | — | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Dec 14, 2022 | An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array(). | ||
| CVE-2022-42329 | — | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Dec 7, 2022 | Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free | ||
| CVE-2022-42328 | — | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Dec 7, 2022 | Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free | ||
| CVE-2022-3643 | — | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Dec 7, 2022 | Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux networ | ||
| CVE-2022-4129 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Nov 28, 2022 | A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service. | ||
| CVE-2022-45934 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Nov 27, 2022 | An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets. | ||
| CVE-2022-42896 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Nov 23, 2022 | There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leakin | ||
| CVE-2022-42895 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Nov 23, 2022 | There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba31 | ||
| CVE-2022-3903 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Nov 14, 2022 | An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the syst | ||
| CVE-2022-43945 | Hig | 7.5 | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Nov 4, 2022 | The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client c | |
| CVE-2022-3635 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Oct 21, 2022 | A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this | ||
| CVE-2022-3606 | — | < 5.3.18-150300.59.112.1 | 5.3.18-150300.59.112.1 | Oct 19, 2022 | A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix | ||
| CVE-2022-3567 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Oct 17, 2022 | A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VD | ||
| CVE-2022-3564 | — | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Oct 17, 2022 | A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to | ||
| CVE-2022-3435 | — | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Oct 8, 2022 | A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is | ||
| CVE-2022-41850 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Sep 30, 2022 | roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress. | ||
| CVE-2022-29900 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Jul 12, 2022 | Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions. | ||
| CVE-2022-29901 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Jul 12, 2022 | Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code exe | ||
| CVE-2019-19083 | — | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Nov 18, 2019 | Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce11 |
- CVE-2022-3106Dec 14, 2022affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().
- CVE-2022-3105Dec 14, 2022affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().
- CVE-2022-42329Dec 7, 2022affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free
- CVE-2022-42328Dec 7, 2022affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free
- CVE-2022-3643Dec 7, 2022affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux networ
- CVE-2022-4129Nov 28, 2022affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.
- CVE-2022-45934Nov 27, 2022affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.
- CVE-2022-42896Nov 23, 2022affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leakin
- CVE-2022-42895Nov 23, 2022affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba31
- CVE-2022-3903Nov 14, 2022affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the syst
- affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client c
- CVE-2022-3635Oct 21, 2022affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this
- CVE-2022-3606Oct 19, 2022affected < 5.3.18-150300.59.112.1fixed 5.3.18-150300.59.112.1
A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix
- CVE-2022-3567Oct 17, 2022affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VD
- CVE-2022-3564Oct 17, 2022affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to
- CVE-2022-3435Oct 8, 2022affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is
- CVE-2022-41850Sep 30, 2022affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress.
- CVE-2022-29900Jul 12, 2022affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.
- CVE-2022-29901Jul 12, 2022affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code exe
- CVE-2019-19083Nov 18, 2019affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce11
Page 2 of 2