VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Workstation Extension 15 SP5

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP5

Vulnerabilities (2,017)

  • CVE-2023-46813Oct 27, 2023
    affected < 5.14.21-150500.55.36.1fixed 5.14.21-150500.55.36.1

    An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to ke

  • CVE-2023-5717Oct 25, 2023
    affected < 5.14.21-150500.55.39.1fixed 5.14.21-150500.55.39.1

    A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can i

  • CVE-2023-5633Oct 23, 2023
    affected < 5.14.21-150500.55.39.1fixed 5.14.21-150500.55.39.1

    The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unp

  • CVE-2023-45871Oct 15, 2023
    affected < 5.14.21-150500.55.39.1fixed 5.14.21-150500.55.39.1

    An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.

  • CVE-2023-45863Oct 14, 2023
    affected < 5.14.21-150500.55.39.1fixed 5.14.21-150500.55.39.1

    An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

  • CVE-2023-39194Oct 9, 2023
    affected < 5.14.21-150500.55.31.1fixed 5.14.21-150500.55.31.1

    A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds re

  • CVE-2023-39193Oct 9, 2023
    affected < 5.14.21-150500.55.31.1fixed 5.14.21-150500.55.31.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

  • CVE-2023-39192Oct 9, 2023
    affected < 5.14.21-150500.55.31.1fixed 5.14.21-150500.55.31.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundarie

  • CVE-2023-39189Oct 9, 2023
    affected < 5.14.21-150500.55.36.1fixed 5.14.21-150500.55.36.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or inform

  • CVE-2023-42755Oct 5, 2023
    affected < 5.14.21-150500.55.68.1fixed 5.14.21-150500.55.68.1

    A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and

  • CVE-2023-42754Oct 5, 2023
    affected < 5.14.21-150500.55.31.1fixed 5.14.21-150500.55.31.1

    A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with C

  • CVE-2023-39191Oct 4, 2023
    affected < 5.14.21-150500.55.36.1fixed 5.14.21-150500.55.36.1

    An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalat

  • CVE-2023-5345Oct 3, 2023
    affected < 5.14.21-150500.55.31.1fixed 5.14.21-150500.55.31.1

    A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We

  • CVE-2023-5197Sep 26, 2023
    affected < 5.14.21-150500.55.52.1fixed 5.14.21-150500.55.52.1

    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past

  • CVE-2023-42753Sep 25, 2023
    affected < 5.14.21-150500.55.31.1fixed 5.14.21-150500.55.31.1

    An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This iss

  • CVE-2023-5158Sep 25, 2023
    affected < 5.14.21-150500.55.39.1fixed 5.14.21-150500.55.39.1

    A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.

  • CVE-2023-34319Sep 22, 2023
    affected < 5.14.21-150500.55.28.1fixed 5.14.21-150500.55.28.1

    The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split

  • CVE-2023-2163Sep 20, 2023
    affected < 5.14.21-150500.55.36.1fixed 5.14.21-150500.55.36.1

    Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.

  • CVE-2023-4155Sep 13, 2023
    affected < 5.14.21-150500.55.31.1fixed 5.14.21-150500.55.31.1

    A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the

  • CVE-2023-4921Sep 12, 2023
    affected < 5.14.21-150500.55.31.1fixed 5.14.21-150500.55.31.1

    A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrec

Page 94 of 101