VYPR

rpm package

almalinux/kernel-zfcpdump-modules-core

pkg:rpm/almalinux/kernel-zfcpdump-modules-core

Vulnerabilities (729)

  • CVE-2023-4133Aug 3, 2023
    affected < 5.14.0-427.13.1.el9_4fixed 5.14.0-427.13.1.el9_4

    A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of ser

  • CVE-2023-4004Jul 31, 2023
    affected < 5.14.0-284.30.1.el9_2fixed 5.14.0-284.30.1.el9_2

    A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the syste

  • CVE-2023-20593Jul 24, 2023
    affected < 5.14.0-284.30.1.el9_2fixed 5.14.0-284.30.1.el9_2

    An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

  • CVE-2023-3567Jul 24, 2023
    affected < 5.14.0-427.13.1.el9_4fixed 5.14.0-427.13.1.el9_4

    A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.

  • CVE-2023-3776Jul 21, 2023
    affected < 5.14.0-284.30.1.el9_2fixed 5.14.0-284.30.1.el9_2

    A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_b

  • CVE-2023-3610Jul 21, 2023
    affected < 5.14.0-284.30.1.el9_2fixed 5.14.0-284.30.1.el9_2

    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET

  • CVE-2023-37453Jul 6, 2023
    affected < 5.14.0-427.13.1.el9_4fixed 5.14.0-427.13.1.el9_4

    An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.

  • CVE-2023-35001Jul 5, 2023
    affected < 5.14.0-284.30.1.el9_2fixed 5.14.0-284.30.1.el9_2

    Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace

  • CVE-2023-31248Jul 5, 2023
    affected < 5.14.0-284.30.1.el9_2fixed 5.14.0-284.30.1.el9_2

    Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace

  • CVE-2023-3390Jun 28, 2023
    affected < 5.14.0-284.30.1.el9_2fixed 5.14.0-284.30.1.el9_2

    A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This fl

  • CVE-2023-3090Jun 28, 2023
    affected < 5.14.0-284.25.1.el9_2fixed 5.14.0-284.25.1.el9_2

    A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation. The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_

  • CVE-2023-35788Jun 16, 2023
    affected < 5.14.0-284.25.1.el9_2fixed 5.14.0-284.25.1.el9_2

    An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.

  • CVE-2023-2002May 26, 2023
    affected < 5.14.0-284.18.1.el9_2fixed 5.14.0-284.18.1.el9_2

    A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availabil

  • CVE-2023-1195May 18, 2023
    affected < 5.14.0-284.11.1.el9_2fixed 5.14.0-284.11.1.el9_2

    A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server->hostname to NULL, leading to an invalid pointer request.

  • CVE-2023-2124May 15, 2023
    affected < 5.14.0-284.18.1.el9_2fixed 5.14.0-284.18.1.el9_2

    An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.

  • CVE-2023-21102May 15, 2023
    affected < 5.14.0-284.30.1.el9_2fixed 5.14.0-284.30.1.el9_2

    In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Pr

  • CVE-2023-32233May 8, 2023
    affected < 5.14.0-284.18.1.el9_2fixed 5.14.0-284.18.1.el9_2

    In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mis

  • CVE-2023-2235May 1, 2023
    affected < 5.14.0-284.18.1.el9_2fixed 5.14.0-284.18.1.el9_2

    A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it p

  • CVE-2023-0458Apr 26, 2023
    affected < 5.14.0-284.25.1.el9_2fixed 5.14.0-284.25.1.el9_2

    A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 o

  • CVE-2023-31083Apr 24, 2023
    affected < 5.14.0-427.13.1.el9_4fixed 5.14.0-427.13.1.el9_4

    An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.

Page 34 of 37