VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise High Availability Extension 15 SP1

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP1

Vulnerabilities (669)

  • CVE-2023-39194Oct 9, 2023
    affected < 4.12.14-150100.197.160.1fixed 4.12.14-150100.197.160.1

    A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds re

  • CVE-2023-39193Oct 9, 2023
    affected < 4.12.14-150100.197.160.1fixed 4.12.14-150100.197.160.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

  • CVE-2023-39192Oct 9, 2023
    affected < 4.12.14-150100.197.160.1fixed 4.12.14-150100.197.160.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundarie

  • CVE-2023-39189Oct 9, 2023
    affected < 4.12.14-150100.197.160.1fixed 4.12.14-150100.197.160.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or inform

  • CVE-2023-42754Oct 5, 2023
    affected < 4.12.14-150100.197.160.1fixed 4.12.14-150100.197.160.1

    A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with C

  • CVE-2023-34319Sep 22, 2023
    affected < 4.12.14-150100.197.154.1fixed 4.12.14-150100.197.154.1

    The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split

  • CVE-2020-36766Sep 18, 2023
    affected < 4.12.14-150100.197.160.1fixed 4.12.14-150100.197.160.1

    An issue was discovered in the Linux kernel before 5.8.6. drivers/media/cec/core/cec-api.c leaks one byte of kernel memory on specific hardware to unprivileged users, because of directly assigning log_addrs with a hole in the struct.

  • CVE-2023-4921Sep 12, 2023
    affected < 4.12.14-150100.197.160.1fixed 4.12.14-150100.197.160.1

    A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrec

  • CVE-2023-4623Sep 6, 2023
    affected < 4.12.14-150100.197.160.1fixed 4.12.14-150100.197.160.1

    A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curv

  • CVE-2023-4622Sep 6, 2023
    affected < 4.12.14-150100.197.160.1fixed 4.12.14-150100.197.160.1

    A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where uni

  • CVE-2023-4459Aug 21, 2023
    affected < 4.12.14-150100.197.157.1fixed 4.12.14-150100.197.157.1

    A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sani

  • CVE-2023-4387Aug 16, 2023
    affected < 4.12.14-150100.197.157.1fixed 4.12.14-150100.197.157.1

    A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all,

  • CVE-2023-4385Aug 16, 2023
    affected < 4.12.14-150100.197.157.1fixed 4.12.14-150100.197.157.1

    A NULL pointer dereference flaw was found in dbFree in fs/jfs/jfs_dmap.c in the journaling file system (JFS) in the Linux Kernel. This issue may allow a local attacker to crash the system due to a missing sanity check.

  • CVE-2023-40283Aug 14, 2023
    affected < 4.12.14-150100.197.160.1fixed 4.12.14-150100.197.160.1

    An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

  • CVE-2022-40982Aug 11, 2023
    affected < 4.12.14-150100.197.154.1fixed 4.12.14-150100.197.154.1

    Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2023-20588Aug 8, 2023
    affected < 4.12.14-150100.197.157.1fixed 4.12.14-150100.197.157.1

    A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 

  • CVE-2023-20569Aug 8, 2023
    affected < 4.12.14-150100.197.154.1fixed 4.12.14-150100.197.154.1

    A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

  • CVE-2023-4194Aug 7, 2023
    affected < 4.12.14-150100.197.154.1fixed 4.12.14-150100.197.154.1

    A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following ups

  • CVE-2023-4132Aug 3, 2023
    affected < 4.12.14-150100.197.157.1fixed 4.12.14-150100.197.157.1

    A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition.

  • CVE-2023-4133Aug 3, 2023
    affected < 4.12.14-150100.197.154.1fixed 4.12.14-150100.197.154.1

    A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of ser

Page 2 of 34