VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Workstation Extension 15 SP6

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP6

Vulnerabilities (3,752)

  • CVE-2024-23848MedJan 23, 2024
    affected < 6.4.0-150600.23.7.3fixed 6.4.0-150600.23.7.3

    In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.

  • CVE-2023-39197Jan 23, 2024
    affected < 6.4.0-150600.23.73.1fixed 6.4.0-150600.23.73.1

    An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.

  • CVE-2024-0639Jan 17, 2024
    affected < 6.4.0-150600.23.7.3fixed 6.4.0-150600.23.7.3

    A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.

  • CVE-2023-6270Jan 4, 2024
    affected < 6.4.0-150600.23.30.1fixed 6.4.0-150600.23.30.1

    A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` glob

  • CVE-2023-51780Dec 25, 2023
    affected < 6.4.0-150600.23.17.1fixed 6.4.0-150600.23.17.1

    An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.

  • CVE-2023-7042Dec 21, 2023
    affected < 6.4.0-150600.23.7.3fixed 6.4.0-150600.23.7.3

    A null pointer dereference vulnerability was found in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() in drivers/net/wireless/ath/ath10k/wmi-tlv.c in the Linux kernel. This issue could be exploited to trigger a denial of service.

  • CVE-2023-6238Nov 21, 2023
    affected < 6.4.0-150600.23.7.3fixed 6.4.0-150600.23.7.3

    A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing r

  • CVE-2023-42753Sep 25, 2023
    affected < 6.4.0-150600.23.73.1fixed 6.4.0-150600.23.73.1

    An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This iss

  • CVE-2023-3772Jul 25, 2023
    affected < 6.4.0-150600.23.73.1fixed 6.4.0-150600.23.73.1

    A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of s

  • CVE-2023-0160Jul 18, 2023
    affected < 6.4.0-150600.23.7.3fixed 6.4.0-150600.23.7.3

    A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system.

  • CVE-2023-31248Jul 5, 2023
    affected < 6.4.0-150600.23.73.1fixed 6.4.0-150600.23.73.1

    Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace

  • CVE-2019-11135Nov 14, 2019
    affected < 6.4.0-150600.23.65.1fixed 6.4.0-150600.23.65.1

    TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

Page 188 of 188