VYPR

rpm package

opensuse/kernel-rt&distro=openSUSE Leap Micro 5.3

pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%20Micro%205.3

Vulnerabilities (676)

  • CVE-2023-1075Mar 27, 2023
    affected < 5.14.21-150400.15.18.1fixed 5.14.21-150400.15.18.1

    A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec->tx_ready.

  • CVE-2023-0179Mar 27, 2023
    affected < 5.14.21-150400.15.11.1fixed 5.14.21-150400.15.11.1

    A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.

  • CVE-2023-1513Mar 23, 2023
    affected < 5.14.21-150400.15.23.1fixed 5.14.21-150400.15.23.1

    A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.

  • CVE-2023-1249Mar 23, 2023
    affected < 5.14.21-150400.15.37.2fixed 5.14.21-150400.15.37.2

    A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected.

  • CVE-2023-0590Mar 23, 2023
    affected < 5.14.21-150400.15.11.1fixed 5.14.21-150400.15.11.1

    A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.

  • CVE-2023-1281Mar 22, 2023
    affected < 5.14.21-150400.15.23.1fixed 5.14.21-150400.15.23.1

    Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A l

  • CVE-2023-0386KEVMar 22, 2023
    affected < 5.14.21-150400.15.28.2fixed 5.14.21-150400.15.28.2

    A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a loca

  • CVE-2023-28466Mar 15, 2023
    affected < 5.14.21-150400.15.23.1fixed 5.14.21-150400.15.23.1

    do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).

  • CVE-2023-1118Mar 2, 2023
    affected < 5.14.21-150400.15.18.1fixed 5.14.21-150400.15.18.1

    A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.

  • CVE-2023-23006Mar 1, 2023
    affected < 5.14.21-150400.15.28.2fixed 5.14.21-150400.15.28.2

    In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-23004Mar 1, 2023
    affected < 5.14.21-150400.15.18.1fixed 5.14.21-150400.15.18.1

    In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-23001Mar 1, 2023
    affected < 5.14.21-150400.15.23.1fixed 5.14.21-150400.15.23.1

    In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-23000Mar 1, 2023
    affected < 5.14.21-150400.15.18.1fixed 5.14.21-150400.15.18.1

    In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.

  • CVE-2023-0461Feb 28, 2023
    affected < 5.14.21-150400.15.18.1fixed 5.14.21-150400.15.18.1

    There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege

  • CVE-2023-22998Feb 28, 2023
    affected < 5.14.21-150400.15.18.1fixed 5.14.21-150400.15.18.1

    In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-22995Feb 28, 2023
    affected < 5.14.21-150400.15.18.1fixed 5.14.21-150400.15.18.1

    In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.

  • CVE-2023-1095Feb 28, 2023
    affected < 5.14.21-150400.15.18.1fixed 5.14.21-150400.15.18.1

    In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer deref

  • CVE-2023-26545Feb 25, 2023
    affected < 5.14.21-150400.15.18.1fixed 5.14.21-150400.15.18.1

    In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.

  • CVE-2023-0597Feb 23, 2023
    affected < 5.14.21-150400.15.18.1fixed 5.14.21-150400.15.18.1

    A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected l

  • CVE-2023-25012Feb 1, 2023
    affected < 5.14.21-150400.15.18.1fixed 5.14.21-150400.15.18.1

    The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.