VYPR

rpm package

opensuse/kernel-rt_debug&distro=openSUSE Leap 15.4

pkg:rpm/opensuse/kernel-rt_debug&distro=openSUSE%20Leap%2015.4

Vulnerabilities (252)

  • CVE-2022-28693MedFeb 14, 2025
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

  • CVE-2023-4134Nov 14, 2024
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of ser

  • CVE-2023-39197Jan 23, 2024
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.

  • CVE-2022-2602Jan 8, 2024
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    io_uring UAF, Unix SCM garbage collection

  • CVE-2022-2588Jan 8, 2024
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.

  • CVE-2022-2586KEVJan 8, 2024
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.

  • CVE-2023-34324Jan 5, 2024
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. t

  • CVE-2023-6176Nov 16, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escal

  • CVE-2023-39198Nov 9, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the ret

  • CVE-2023-6039Nov 9, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.

  • CVE-2023-5178Nov 1, 2023
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote c

  • CVE-2023-46862Oct 29, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.

  • CVE-2023-46813Oct 27, 2023
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to ke

  • CVE-2023-5717Oct 25, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can i

  • CVE-2023-45871Oct 15, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.

  • CVE-2023-45863Oct 14, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

  • CVE-2023-45862Oct 14, 2023
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

  • CVE-2023-39189Oct 9, 2023
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or inform

  • CVE-2023-5158Sep 25, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.

  • CVE-2023-34319Sep 22, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split

Page 1 of 13