VYPR

rpm package

opensuse/kernel-syms-rt&distro=openSUSE Leap 15.4

pkg:rpm/opensuse/kernel-syms-rt&distro=openSUSE%20Leap%2015.4

Vulnerabilities (252)

  • CVE-2023-2163Sep 20, 2023
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.

  • CVE-2023-4244Sep 6, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to under

  • CVE-2023-3777Sep 6, 2023
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release

  • CVE-2023-4569Aug 28, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak.

  • CVE-2023-4459Aug 21, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sani

  • CVE-2023-4387Aug 16, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all,

  • CVE-2022-40982Aug 11, 2023
    affected < 5.14.21-150400.15.46.1fixed 5.14.21-150400.15.46.1

    Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2023-25775Aug 11, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

  • CVE-2023-4273Aug 9, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a si

  • CVE-2023-20588Aug 8, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 

  • CVE-2023-20569Aug 8, 2023
    affected < 5.14.21-150400.15.46.1fixed 5.14.21-150400.15.46.1

    A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

  • CVE-2023-4194Aug 7, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following ups

  • CVE-2023-4147Aug 7, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.

  • CVE-2023-4133Aug 3, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of ser

  • CVE-2023-4004Jul 31, 2023
    affected < 5.14.21-150400.15.46.1fixed 5.14.21-150400.15.46.1

    A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the syste

  • CVE-2023-3772Jul 25, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of s

  • CVE-2023-20593Jul 24, 2023
    affected < 5.14.21-150400.15.46.1fixed 5.14.21-150400.15.46.1

    An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

  • CVE-2023-3812Jul 24, 2023
    affected < 5.14.21-150400.15.46.1fixed 5.14.21-150400.15.46.1

    An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on t

  • CVE-2023-3567Jul 24, 2023
    affected < 5.14.21-150400.15.46.1fixed 5.14.21-150400.15.46.1

    A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.

  • CVE-2023-3863Jul 24, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.

Page 2 of 13