rpm package
opensuse/kernel-obs-build&distro=openSUSE Leap 15.5
pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.5
Vulnerabilities (1,895)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-1583 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Mar 24, 2023 | A NULL pointer dereference was found in io_file_bitmap_get in io_uring/filetable.c in the io_uring sub-component in the Linux Kernel. When fixed files are unregistered, some context information (file_alloc_{start,end} and alloc_hint) is not cleared. A subsequent request that has | ||
| CVE-2023-1513 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Mar 23, 2023 | A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak. | ||
| CVE-2023-1249 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Mar 23, 2023 | A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected. | ||
| CVE-2023-0590 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Mar 23, 2023 | A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected. | ||
| CVE-2023-1118 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Mar 2, 2023 | A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. | ||
| CVE-2023-23006 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Mar 1, 2023 | In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer). | ||
| CVE-2023-23004 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Mar 1, 2023 | In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer). | ||
| CVE-2023-23001 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Mar 1, 2023 | In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer). | ||
| CVE-2023-23000 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Mar 1, 2023 | In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used. | ||
| CVE-2023-0461 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Feb 28, 2023 | There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege | ||
| CVE-2023-22998 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Feb 28, 2023 | In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer). | ||
| CVE-2023-1095 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Feb 28, 2023 | In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer deref | ||
| CVE-2023-26545 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Feb 25, 2023 | In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device. | ||
| CVE-2023-0597 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Feb 23, 2023 | A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected l | ||
| CVE-2023-25012 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Feb 1, 2023 | The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long. | ||
| CVE-2023-0469 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Jan 25, 2023 | A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service. | ||
| CVE-2023-0394 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Jan 24, 2023 | A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash. | ||
| CVE-2023-0122 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Jan 17, 2023 | A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4. | ||
| CVE-2022-4382 | — | < 5.14.21-150500.55.80.1 | 5.14.21-150500.55.80.1 | Jan 10, 2023 | A use-after-free flaw caused by a race among the superblock operations in the gadgetfs Linux driver was found. It could be triggered by yanking out a device that is running the gadgetfs side. | ||
| CVE-2022-4269 | — | < 5.14.21-150500.55.7.1 | 5.14.21-150500.55.7.1 | Dec 5, 2022 | A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in |
- CVE-2023-1583Mar 24, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
A NULL pointer dereference was found in io_file_bitmap_get in io_uring/filetable.c in the io_uring sub-component in the Linux Kernel. When fixed files are unregistered, some context information (file_alloc_{start,end} and alloc_hint) is not cleared. A subsequent request that has
- CVE-2023-1513Mar 23, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.
- CVE-2023-1249Mar 23, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected.
- CVE-2023-0590Mar 23, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.
- CVE-2023-1118Mar 2, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
- CVE-2023-23006Mar 1, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
- CVE-2023-23004Mar 1, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
- CVE-2023-23001Mar 1, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
- CVE-2023-23000Mar 1, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.
- CVE-2023-0461Feb 28, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege
- CVE-2023-22998Feb 28, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
- CVE-2023-1095Feb 28, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer deref
- CVE-2023-26545Feb 25, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.
- CVE-2023-0597Feb 23, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected l
- CVE-2023-25012Feb 1, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.
- CVE-2023-0469Jan 25, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service.
- CVE-2023-0394Jan 24, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
- CVE-2023-0122Jan 17, 2023affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4.
- CVE-2022-4382Jan 10, 2023affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1
A use-after-free flaw caused by a race among the superblock operations in the gadgetfs Linux driver was found. It could be triggered by yanking out a device that is running the gadgetfs side.
- CVE-2022-4269Dec 5, 2022affected < 5.14.21-150500.55.7.1fixed 5.14.21-150500.55.7.1
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in
Page 94 of 95