VYPR

rpm package

opensuse/kernel-default&distro=openSUSE Leap Micro 5.4

pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%20Micro%205.4

Vulnerabilities (578)

  • CVE-2024-26589Feb 22, 2024
    affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2

    In the Linux kernel, the following vulnerability has been resolved: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS For PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off for validation. However, variable offset ptr alu is not prohibited for this ptr kind. So th

  • CVE-2024-26586Feb 22, 2024
    affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix stack corruption When tc filters are first added to a net device, the corresponding local port gets bound to an ACL group in the device. The group contains a list of ACLs. In turn,

  • CVE-2023-52443Feb 22, 2024
    affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2

    In the Linux kernel, the following vulnerability has been resolved: apparmor: avoid crash when parsed profile name is empty When processing a packed profile in unpack_profile() described like "profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}" a string

  • CVE-2024-26585Feb 21, 2024
    affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2

    In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous commit, the submitting thread (recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete(). Reorder scheduling

  • CVE-2023-52439Feb 20, 2024
    affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2

    In the Linux kernel, the following vulnerability has been resolved: uio: Fix use-after-free in uio_open core-1 core-2 ------------------------------------------------------- uio_unregister_device uio_open idev = idr_find() device_unregister(&idev->dev) put_device(&idev-

  • CVE-2023-52429Feb 12, 2024
    affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2

    dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.

  • CVE-2024-1151Feb 11, 2024
    affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2

    A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflo

  • CVE-2023-6536Feb 7, 2024
    affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1

    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial

  • CVE-2023-6535Feb 7, 2024
    affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1

    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial

  • CVE-2023-6356Feb 7, 2024
    affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1

    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a deni

  • CVE-2024-24860Feb 5, 2024
    affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1

    A race condition was found in the Linux kernel's bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.

  • CVE-2024-1086KEVJan 31, 2024
    affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1

    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cau

  • CVE-2024-1085Jan 31, 2024
    affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1

    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the

  • CVE-2023-46838Jan 29, 2024
    affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1

    Transmit requests in Xen's virtual network protocol can consist of multiple parts. While not really useful, except for the initial part any of them may be of zero length, i.e. carry no data at all. Besides a certain initial portion of the to be transferred data, these parts are

  • CVE-2024-0841Jan 28, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.

  • CVE-2024-23307MedJan 25, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.

  • CVE-2024-22099MedJan 25, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C. This issue affects Linux kernel: v2.6.12-rc2.

  • CVE-2024-23848MedJan 23, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.

  • CVE-2023-39197Jan 23, 2024
    affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2

    An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.

  • CVE-2024-23851Jan 23, 2024
    affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2

    copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel->data_size check. This is related to ctl_ioctl.

Page 25 of 29