rpm package
opensuse/kernel-syms-rt&distro=openSUSE Leap 15.4
pkg:rpm/opensuse/kernel-syms-rt&distro=openSUSE%20Leap%2015.4
Vulnerabilities (252)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-28693 | Med | 4.7 | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Feb 14, 2025 | Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. | |
| CVE-2023-4134 | — | < 5.14.21-150400.15.53.1 | 5.14.21-150400.15.53.1 | Nov 14, 2024 | A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of ser | ||
| CVE-2023-39197 | — | < 5.14.21-150400.15.62.1 | 5.14.21-150400.15.62.1 | Jan 23, 2024 | An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol. | ||
| CVE-2022-2602 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Jan 8, 2024 | io_uring UAF, Unix SCM garbage collection | ||
| CVE-2022-2588 | — | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Jan 8, 2024 | It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0. | ||
| CVE-2022-2586 | — | KEV | < 5.14.21-150400.15.5.1 | 5.14.21-150400.15.5.1 | Jan 8, 2024 | It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted. | |
| CVE-2023-34324 | — | < 5.14.21-150400.15.59.1 | 5.14.21-150400.15.59.1 | Jan 5, 2024 | Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. t | ||
| CVE-2023-6176 | — | < 5.14.21-150400.15.62.1 | 5.14.21-150400.15.62.1 | Nov 16, 2023 | A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escal | ||
| CVE-2023-39198 | — | < 5.14.21-150400.15.62.1 | 5.14.21-150400.15.62.1 | Nov 9, 2023 | A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the ret | ||
| CVE-2023-6039 | — | < 5.14.21-150400.15.62.1 | 5.14.21-150400.15.62.1 | Nov 9, 2023 | A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches. | ||
| CVE-2023-5178 | — | < 5.14.21-150400.15.59.1 | 5.14.21-150400.15.59.1 | Nov 1, 2023 | A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote c | ||
| CVE-2023-46862 | — | < 5.14.21-150400.15.62.1 | 5.14.21-150400.15.62.1 | Oct 29, 2023 | An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur. | ||
| CVE-2023-46813 | — | < 5.14.21-150400.15.59.1 | 5.14.21-150400.15.59.1 | Oct 27, 2023 | An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to ke | ||
| CVE-2023-5717 | — | < 5.14.21-150400.15.62.1 | 5.14.21-150400.15.62.1 | Oct 25, 2023 | A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can i | ||
| CVE-2023-45871 | — | < 5.14.21-150400.15.62.1 | 5.14.21-150400.15.62.1 | Oct 15, 2023 | An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU. | ||
| CVE-2023-45863 | — | < 5.14.21-150400.15.62.1 | 5.14.21-150400.15.62.1 | Oct 14, 2023 | An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write. | ||
| CVE-2023-45862 | — | < 5.14.21-150400.15.59.1 | 5.14.21-150400.15.59.1 | Oct 14, 2023 | An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation. | ||
| CVE-2023-39189 | — | < 5.14.21-150400.15.59.1 | 5.14.21-150400.15.59.1 | Oct 9, 2023 | A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or inform | ||
| CVE-2023-5158 | — | < 5.14.21-150400.15.62.1 | 5.14.21-150400.15.62.1 | Sep 25, 2023 | A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor. | ||
| CVE-2023-34319 | — | < 5.14.21-150400.15.53.1 | 5.14.21-150400.15.53.1 | Sep 22, 2023 | The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split |
- affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
- CVE-2023-4134Nov 14, 2024affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1
A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of ser
- CVE-2023-39197Jan 23, 2024affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1
An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.
- CVE-2022-2602Jan 8, 2024affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
io_uring UAF, Unix SCM garbage collection
- CVE-2022-2588Jan 8, 2024affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.
- affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1
It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.
- CVE-2023-34324Jan 5, 2024affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1
Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. t
- CVE-2023-6176Nov 16, 2023affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1
A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escal
- CVE-2023-39198Nov 9, 2023affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1
A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the ret
- CVE-2023-6039Nov 9, 2023affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1
A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.
- CVE-2023-5178Nov 1, 2023affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1
A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote c
- CVE-2023-46862Oct 29, 2023affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1
An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.
- CVE-2023-46813Oct 27, 2023affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1
An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to ke
- CVE-2023-5717Oct 25, 2023affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1
A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can i
- CVE-2023-45871Oct 15, 2023affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1
An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
- CVE-2023-45863Oct 14, 2023affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1
An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.
- CVE-2023-45862Oct 14, 2023affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1
An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.
- CVE-2023-39189Oct 9, 2023affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1
A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or inform
- CVE-2023-5158Sep 25, 2023affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1
A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.
- CVE-2023-34319Sep 22, 2023affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1
The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split
Page 1 of 13