VYPR

rpm package

opensuse/kernel-default-base&distro=openSUSE Leap Micro 5.4

pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%20Micro%205.4

Vulnerabilities (578)

  • CVE-2023-3390Jun 28, 2023
    affected < 5.14.21-150400.24.74.1.150400.24.33.3fixed 5.14.21-150400.24.74.1.150400.24.33.3

    A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This fl

  • CVE-2023-35827Jun 18, 2023
    affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5

    An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.

  • CVE-2023-3268Jun 16, 2023
    affected < 5.14.21-150400.24.81.1.150400.24.35.3fixed 5.14.21-150400.24.81.1.150400.24.35.3

    An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.

  • CVE-2023-2985Jun 1, 2023
    affected < 5.14.21-150400.24.74.1.150400.24.33.3fixed 5.14.21-150400.24.74.1.150400.24.33.3

    A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.

  • CVE-2023-0459May 25, 2023
    affected < 5.14.21-150400.24.81.1.150400.24.35.3fixed 5.14.21-150400.24.81.1.150400.24.35.3

    Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commi

  • CVE-2023-2156May 9, 2023
    affected < 5.14.21-150400.24.81.1.150400.24.35.3fixed 5.14.21-150400.24.81.1.150400.24.35.3

    A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create

  • CVE-2023-31085Apr 24, 2023
    affected < 5.14.21-150400.24.97.1.150400.24.44.2fixed 5.14.21-150400.24.97.1.150400.24.44.2

    An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0.

  • CVE-2023-31083Apr 24, 2023
    affected < 5.14.21-150400.24.81.1.150400.24.35.3fixed 5.14.21-150400.24.81.1.150400.24.35.3

    An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.

  • CVE-2023-2006Apr 24, 2023
    affected < 5.14.21-150400.24.100.2.150400.24.46.2fixed 5.14.21-150400.24.100.2.150400.24.46.2

    A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary cod

  • CVE-2023-2166Apr 19, 2023
    affected < 5.14.21-150400.24.81.1.150400.24.35.3fixed 5.14.21-150400.24.81.1.150400.24.35.3

    A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.

  • CVE-2023-1829Apr 12, 2023
    affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2

    A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying struc

  • CVE-2022-4744Mar 30, 2023
    affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5

    A double-free flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the

  • CVE-2022-20154Jun 15, 2022
    affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5

    In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:

  • CVE-2021-4148Mar 23, 2022
    affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2

    A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.

  • CVE-2021-39698Mar 16, 2022
    affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2

    In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android ke

  • CVE-2021-43527Dec 8, 2021
    affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2

    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted.

  • CVE-2021-43056Oct 28, 2021
    affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2

    An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.

  • CVE-2020-26555May 24, 2021
    affected < 5.14.21-150400.24.103.1.150400.24.48.1fixed 5.14.21-150400.24.103.1.150400.24.48.1

    Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.

Page 29 of 29