VYPR

rpm package

suse/kernel-azure&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP5

pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5

Vulnerabilities (1,481)

  • CVE-2023-6121MedNov 16, 2023
    affected < 4.12.14-16.163.1fixed 4.12.14-16.163.1

    An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the ke

  • CVE-2023-39198Nov 9, 2023
    affected < 4.12.14-16.160.1fixed 4.12.14-16.160.1

    A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the ret

  • CVE-2023-47233MedNov 3, 2023
    affected < 4.12.14-16.168.1fixed 4.12.14-16.168.1

    The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this "could be exploited in a real world scenario." This is r

  • CVE-2023-1192Nov 1, 2023
    affected < 4.12.14-16.152.1fixed 4.12.14-16.152.1

    A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access

  • CVE-2023-5717Oct 25, 2023
    affected < 4.12.14-16.160.1fixed 4.12.14-16.160.1

    A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can i

  • CVE-2023-45871Oct 15, 2023
    affected < 4.12.14-16.160.1fixed 4.12.14-16.160.1

    An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.

  • CVE-2023-45863Oct 14, 2023
    affected < 4.12.14-16.160.1fixed 4.12.14-16.160.1

    An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

  • CVE-2023-45862Oct 14, 2023
    affected < 4.12.14-16.155.1fixed 4.12.14-16.155.1

    An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

  • CVE-2023-39194Oct 9, 2023
    affected < 4.12.14-16.152.1fixed 4.12.14-16.152.1

    A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds re

  • CVE-2023-39193Oct 9, 2023
    affected < 4.12.14-16.152.1fixed 4.12.14-16.152.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

  • CVE-2023-39192Oct 9, 2023
    affected < 4.12.14-16.152.1fixed 4.12.14-16.152.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundarie

  • CVE-2023-39189Oct 9, 2023
    affected < 4.12.14-16.155.1fixed 4.12.14-16.155.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or inform

  • CVE-2023-42755Oct 5, 2023
    affected < 4.12.14-16.188.1fixed 4.12.14-16.188.1

    A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and

  • CVE-2023-42754Oct 5, 2023
    affected < 4.12.14-16.152.1fixed 4.12.14-16.152.1

    A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with C

  • CVE-2023-34319Sep 22, 2023
    affected < 4.12.14-16.149.1fixed 4.12.14-16.149.1

    The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split

  • CVE-2020-36766Sep 18, 2023
    affected < 4.12.14-16.152.1fixed 4.12.14-16.152.1

    An issue was discovered in the Linux kernel before 5.8.6. drivers/media/cec/core/cec-api.c leaks one byte of kernel memory on specific hardware to unprivileged users, because of directly assigning log_addrs with a hole in the struct.

  • CVE-2023-4921Sep 12, 2023
    affected < 4.12.14-16.152.1fixed 4.12.14-16.152.1

    A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrec

  • CVE-2023-4623Sep 6, 2023
    affected < 4.12.14-16.152.1fixed 4.12.14-16.152.1

    A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curv

  • CVE-2023-4622Sep 6, 2023
    affected < 4.12.14-16.152.1fixed 4.12.14-16.152.1

    A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where uni

  • CVE-2023-4244Sep 6, 2023
    affected < 4.12.14-16.194.1fixed 4.12.14-16.194.1

    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to under

Page 46 of 75