rpm package
suse/kernel-default&distro=SUSE Manager Server 4.3
pkg:rpm/suse/kernel-default&distro=SUSE%20Manager%20Server%204.3
Vulnerabilities (1,907)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-1085 | — | < 5.14.21-150400.24.108.1 | 5.14.21-150400.24.108.1 | Jan 31, 2024 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the | ||
| CVE-2023-46838 | — | < 5.14.21-150400.24.108.1 | 5.14.21-150400.24.108.1 | Jan 29, 2024 | Transmit requests in Xen's virtual network protocol can consist of multiple parts. While not really useful, except for the initial part any of them may be of zero length, i.e. carry no data at all. Besides a certain initial portion of the to be transferred data, these parts are | ||
| CVE-2024-0841 | — | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Jan 28, 2024 | A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system. | ||
| CVE-2024-23307 | Med | 4.4 | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Jan 25, 2024 | Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow. | |
| CVE-2024-22099 | Med | 6.3 | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Jan 25, 2024 | NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C. This issue affects Linux kernel: v2.6.12-rc2. | |
| CVE-2024-23848 | Med | 5.5 | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Jan 23, 2024 | In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c. | |
| CVE-2024-23851 | — | < 5.14.21-150400.24.111.2 | 5.14.21-150400.24.111.2 | Jan 23, 2024 | copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel->data_size check. This is related to ctl_ioctl. | ||
| CVE-2024-23850 | — | < 5.14.21-150400.24.111.2 | 5.14.21-150400.24.111.2 | Jan 23, 2024 | In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation. | ||
| CVE-2024-23849 | — | < 5.14.21-150400.24.111.2 | 5.14.21-150400.24.111.2 | Jan 23, 2024 | In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access. | ||
| CVE-2023-51043 | — | < 5.14.21-150400.24.108.1 | 5.14.21-150400.24.108.1 | Jan 23, 2024 | In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload. | ||
| CVE-2023-51042 | — | < 5.14.21-150400.24.108.1 | 5.14.21-150400.24.108.1 | Jan 23, 2024 | In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free. | ||
| CVE-2024-0775 | — | < 5.14.21-150400.24.108.1 | 5.14.21-150400.24.108.1 | Jan 22, 2024 | A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free. | ||
| CVE-2023-6531 | — | < 5.14.21-150400.24.103.1 | 5.14.21-150400.24.103.1 | Jan 21, 2024 | A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on. | ||
| CVE-2024-0607 | — | < 5.14.21-150400.24.111.2 | 5.14.21-150400.24.111.2 | Jan 18, 2024 | A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has | ||
| CVE-2021-33631 | — | < 5.14.21-150400.24.108.1 | 5.14.21-150400.24.108.1 | Jan 18, 2024 | Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0. | ||
| CVE-2024-0641 | — | < 5.14.21-150400.24.108.1 | 5.14.21-150400.24.108.1 | Jan 17, 2024 | A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel’s TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system. | ||
| CVE-2024-0639 | — | < 5.14.21-150400.24.122.2 | 5.14.21-150400.24.122.2 | Jan 17, 2024 | A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system. | ||
| CVE-2024-0565 | — | < 5.14.21-150400.24.108.1 | 5.14.21-150400.24.108.1 | Jan 15, 2024 | An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service. | ||
| CVE-2023-6915 | — | < 5.14.21-150400.24.108.1 | 5.14.21-150400.24.108.1 | Jan 15, 2024 | A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return. | ||
| CVE-2023-6040 | — | < 5.14.21-150400.24.108.1 | 5.14.21-150400.24.108.1 | Jan 12, 2024 | An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_ |
- CVE-2024-1085Jan 31, 2024affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the
- CVE-2023-46838Jan 29, 2024affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1
Transmit requests in Xen's virtual network protocol can consist of multiple parts. While not really useful, except for the initial part any of them may be of zero length, i.e. carry no data at all. Besides a certain initial portion of the to be transferred data, these parts are
- CVE-2024-0841Jan 28, 2024affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
- affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.
- affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C. This issue affects Linux kernel: v2.6.12-rc2.
- affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.
- CVE-2024-23851Jan 23, 2024affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2
copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel->data_size check. This is related to ctl_ioctl.
- CVE-2024-23850Jan 23, 2024affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2
In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.
- CVE-2024-23849Jan 23, 2024affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2
In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.
- CVE-2023-51043Jan 23, 2024affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1
In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.
- CVE-2023-51042Jan 23, 2024affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1
In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.
- CVE-2024-0775Jan 22, 2024affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1
A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.
- CVE-2023-6531Jan 21, 2024affected < 5.14.21-150400.24.103.1fixed 5.14.21-150400.24.103.1
A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.
- CVE-2024-0607Jan 18, 2024affected < 5.14.21-150400.24.111.2fixed 5.14.21-150400.24.111.2
A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has
- CVE-2021-33631Jan 18, 2024affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1
Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.
- CVE-2024-0641Jan 17, 2024affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1
A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel’s TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.
- CVE-2024-0639Jan 17, 2024affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2
A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.
- CVE-2024-0565Jan 15, 2024affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1
An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
- CVE-2023-6915Jan 15, 2024affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1
A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.
- CVE-2023-6040Jan 12, 2024affected < 5.14.21-150400.24.108.1fixed 5.14.21-150400.24.108.1
An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_
Page 92 of 96