rpm package
opensuse/kernel-default-base&distro=openSUSE Leap Micro 5.3
pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%20Micro%205.3
Vulnerabilities (683)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-6546 | — | < 5.14.21-150400.24.103.1.150400.24.48.1 | 5.14.21-150400.24.103.1.150400.24.48.1 | Dec 21, 2023 | A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci | ||
| CVE-2023-6932 | Hig | 7.8 | < 5.14.21-150400.24.103.1.150400.24.48.1 | 5.14.21-150400.24.103.1.150400.24.48.1 | Dec 19, 2023 | A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recomme | |
| CVE-2023-6931 | Hig | 7.8 | < 5.14.21-150400.24.103.1.150400.24.48.1 | 5.14.21-150400.24.103.1.150400.24.48.1 | Dec 19, 2023 | A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation. A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group(). We recomme | |
| CVE-2023-6817 | Hig | 7.8 | < 5.14.21-150400.24.111.2.150400.24.52.1 | 5.14.21-150400.24.111.2.150400.24.52.1 | Dec 18, 2023 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Po | |
| CVE-2023-6622 | — | < 5.14.21-150400.24.103.1.150400.24.48.1 | 5.14.21-150400.24.103.1.150400.24.48.1 | Dec 8, 2023 | A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service. | ||
| CVE-2023-6610 | — | < 5.14.21-150400.24.103.1.150400.24.48.1 | 5.14.21-150400.24.103.1.150400.24.48.1 | Dec 8, 2023 | An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information. | ||
| CVE-2023-6606 | — | < 5.14.21-150400.24.103.1.150400.24.48.1 | 5.14.21-150400.24.103.1.150400.24.48.1 | Dec 8, 2023 | An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information. | ||
| CVE-2023-6176 | — | < 5.14.21-150400.24.100.2.150400.24.46.2 | 5.14.21-150400.24.100.2.150400.24.46.2 | Nov 16, 2023 | A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escal | ||
| CVE-2023-6121 | Med | 4.3 | < 5.14.21-150400.24.103.1.150400.24.48.1 | 5.14.21-150400.24.103.1.150400.24.48.1 | Nov 16, 2023 | An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the ke | |
| CVE-2023-39198 | — | < 5.14.21-150400.24.100.2.150400.24.46.2 | 5.14.21-150400.24.100.2.150400.24.46.2 | Nov 9, 2023 | A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the ret | ||
| CVE-2023-6039 | — | < 5.14.21-150400.24.100.2.150400.24.46.2 | 5.14.21-150400.24.100.2.150400.24.46.2 | Nov 9, 2023 | A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches. | ||
| CVE-2023-47233 | Med | 4.3 | < 5.14.21-150400.24.108.1.150400.24.50.2 | 5.14.21-150400.24.108.1.150400.24.50.2 | Nov 3, 2023 | The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this "could be exploited in a real world scenario." This is r | |
| CVE-2023-5178 | — | < 5.14.21-150400.24.97.1.150400.24.44.2 | 5.14.21-150400.24.97.1.150400.24.44.2 | Nov 1, 2023 | A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote c | ||
| CVE-2023-46862 | — | < 5.14.21-150400.24.100.2.150400.24.46.2 | 5.14.21-150400.24.100.2.150400.24.46.2 | Oct 29, 2023 | An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur. | ||
| CVE-2023-5717 | — | < 5.14.21-150400.24.100.2.150400.24.46.2 | 5.14.21-150400.24.100.2.150400.24.46.2 | Oct 25, 2023 | A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can i | ||
| CVE-2023-45871 | — | < 5.14.21-150400.24.100.2.150400.24.46.2 | 5.14.21-150400.24.100.2.150400.24.46.2 | Oct 15, 2023 | An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU. | ||
| CVE-2023-45863 | — | < 5.14.21-150400.24.100.2.150400.24.46.2 | 5.14.21-150400.24.100.2.150400.24.46.2 | Oct 14, 2023 | An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write. | ||
| CVE-2023-39193 | — | < 5.14.21-150400.24.97.1.150400.24.44.2 | 5.14.21-150400.24.97.1.150400.24.44.2 | Oct 9, 2023 | A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. | ||
| CVE-2023-39189 | — | < 5.14.21-150400.24.97.1.150400.24.44.2 | 5.14.21-150400.24.97.1.150400.24.44.2 | Oct 9, 2023 | A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or inform | ||
| CVE-2023-5197 | — | < 5.14.21-150400.24.111.2.150400.24.52.1 | 5.14.21-150400.24.111.2.150400.24.52.1 | Sep 26, 2023 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past |
- CVE-2023-6546Dec 21, 2023affected < 5.14.21-150400.24.103.1.150400.24.48.1fixed 5.14.21-150400.24.103.1.150400.24.48.1
A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci
- affected < 5.14.21-150400.24.103.1.150400.24.48.1fixed 5.14.21-150400.24.103.1.150400.24.48.1
A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recomme
- affected < 5.14.21-150400.24.103.1.150400.24.48.1fixed 5.14.21-150400.24.103.1.150400.24.48.1
A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation. A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group(). We recomme
- affected < 5.14.21-150400.24.111.2.150400.24.52.1fixed 5.14.21-150400.24.111.2.150400.24.52.1
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Po
- CVE-2023-6622Dec 8, 2023affected < 5.14.21-150400.24.103.1.150400.24.48.1fixed 5.14.21-150400.24.103.1.150400.24.48.1
A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.
- CVE-2023-6610Dec 8, 2023affected < 5.14.21-150400.24.103.1.150400.24.48.1fixed 5.14.21-150400.24.103.1.150400.24.48.1
An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
- CVE-2023-6606Dec 8, 2023affected < 5.14.21-150400.24.103.1.150400.24.48.1fixed 5.14.21-150400.24.103.1.150400.24.48.1
An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
- CVE-2023-6176Nov 16, 2023affected < 5.14.21-150400.24.100.2.150400.24.46.2fixed 5.14.21-150400.24.100.2.150400.24.46.2
A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escal
- affected < 5.14.21-150400.24.103.1.150400.24.48.1fixed 5.14.21-150400.24.103.1.150400.24.48.1
An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the ke
- CVE-2023-39198Nov 9, 2023affected < 5.14.21-150400.24.100.2.150400.24.46.2fixed 5.14.21-150400.24.100.2.150400.24.46.2
A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the ret
- CVE-2023-6039Nov 9, 2023affected < 5.14.21-150400.24.100.2.150400.24.46.2fixed 5.14.21-150400.24.100.2.150400.24.46.2
A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.
- affected < 5.14.21-150400.24.108.1.150400.24.50.2fixed 5.14.21-150400.24.108.1.150400.24.50.2
The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this "could be exploited in a real world scenario." This is r
- CVE-2023-5178Nov 1, 2023affected < 5.14.21-150400.24.97.1.150400.24.44.2fixed 5.14.21-150400.24.97.1.150400.24.44.2
A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote c
- CVE-2023-46862Oct 29, 2023affected < 5.14.21-150400.24.100.2.150400.24.46.2fixed 5.14.21-150400.24.100.2.150400.24.46.2
An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.
- CVE-2023-5717Oct 25, 2023affected < 5.14.21-150400.24.100.2.150400.24.46.2fixed 5.14.21-150400.24.100.2.150400.24.46.2
A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can i
- CVE-2023-45871Oct 15, 2023affected < 5.14.21-150400.24.100.2.150400.24.46.2fixed 5.14.21-150400.24.100.2.150400.24.46.2
An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
- CVE-2023-45863Oct 14, 2023affected < 5.14.21-150400.24.100.2.150400.24.46.2fixed 5.14.21-150400.24.100.2.150400.24.46.2
An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.
- CVE-2023-39193Oct 9, 2023affected < 5.14.21-150400.24.97.1.150400.24.44.2fixed 5.14.21-150400.24.97.1.150400.24.44.2
A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
- CVE-2023-39189Oct 9, 2023affected < 5.14.21-150400.24.97.1.150400.24.44.2fixed 5.14.21-150400.24.97.1.150400.24.44.2
A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or inform
- CVE-2023-5197Sep 26, 2023affected < 5.14.21-150400.24.111.2.150400.24.52.1fixed 5.14.21-150400.24.111.2.150400.24.52.1
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past
Page 27 of 35