rpm package
suse/kernel-default&distro=SUSE Linux Enterprise Workstation Extension 15 SP4
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP4
Vulnerabilities (314)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-28693 | Med | 4.7 | < 5.14.21-150400.24.21.2 | 5.14.21-150400.24.21.2 | Feb 14, 2025 | Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. | |
| CVE-2022-21505 | — | < 5.14.21-150400.24.18.1 | 5.14.21-150400.24.18.1 | Dec 24, 2024 | In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Secure Boot is enabled, but this | ||
| CVE-2023-4134 | — | < 5.14.21-150400.24.88.1 | 5.14.21-150400.24.88.1 | Nov 14, 2024 | A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of ser | ||
| CVE-2023-39197 | — | < 5.14.21-150400.24.100.2 | 5.14.21-150400.24.100.2 | Jan 23, 2024 | An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol. | ||
| CVE-2022-2602 | — | < 5.14.21-150400.24.38.1 | 5.14.21-150400.24.38.1 | Jan 8, 2024 | io_uring UAF, Unix SCM garbage collection | ||
| CVE-2022-2588 | — | < 5.14.21-150400.24.21.2 | 5.14.21-150400.24.21.2 | Jan 8, 2024 | It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0. | ||
| CVE-2022-2586 | — | KEV | < 5.14.21-150400.24.28.1 | 5.14.21-150400.24.28.1 | Jan 8, 2024 | It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted. | |
| CVE-2022-2585 | — | < 5.14.21-150400.24.18.1 | 5.14.21-150400.24.18.1 | Jan 8, 2024 | It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free. | ||
| CVE-2023-34324 | — | < 5.14.21-150400.24.97.1 | 5.14.21-150400.24.97.1 | Jan 5, 2024 | Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. t | ||
| CVE-2023-6176 | — | < 5.14.21-150400.24.100.2 | 5.14.21-150400.24.100.2 | Nov 16, 2023 | A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escal | ||
| CVE-2023-39198 | — | < 5.14.21-150400.24.100.2 | 5.14.21-150400.24.100.2 | Nov 9, 2023 | A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the ret | ||
| CVE-2023-6039 | — | < 5.14.21-150400.24.100.2 | 5.14.21-150400.24.100.2 | Nov 9, 2023 | A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches. | ||
| CVE-2023-1192 | — | < 5.14.21-150400.24.92.1 | 5.14.21-150400.24.92.1 | Nov 1, 2023 | A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access | ||
| CVE-2023-5178 | — | < 5.14.21-150400.24.97.1 | 5.14.21-150400.24.97.1 | Nov 1, 2023 | A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote c | ||
| CVE-2023-46862 | — | < 5.14.21-150400.24.100.2 | 5.14.21-150400.24.100.2 | Oct 29, 2023 | An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur. | ||
| CVE-2023-5717 | — | < 5.14.21-150400.24.100.2 | 5.14.21-150400.24.100.2 | Oct 25, 2023 | A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can i | ||
| CVE-2023-45871 | — | < 5.14.21-150400.24.100.2 | 5.14.21-150400.24.100.2 | Oct 15, 2023 | An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU. | ||
| CVE-2023-45863 | — | < 5.14.21-150400.24.100.2 | 5.14.21-150400.24.100.2 | Oct 14, 2023 | An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write. | ||
| CVE-2023-39194 | — | < 5.14.21-150400.24.92.1 | 5.14.21-150400.24.92.1 | Oct 9, 2023 | A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds re | ||
| CVE-2023-39193 | — | < 5.14.21-150400.24.97.1 | 5.14.21-150400.24.97.1 | Oct 9, 2023 | A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. |
- affected < 5.14.21-150400.24.21.2fixed 5.14.21-150400.24.21.2
Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
- CVE-2022-21505Dec 24, 2024affected < 5.14.21-150400.24.18.1fixed 5.14.21-150400.24.18.1
In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Secure Boot is enabled, but this
- CVE-2023-4134Nov 14, 2024affected < 5.14.21-150400.24.88.1fixed 5.14.21-150400.24.88.1
A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of ser
- CVE-2023-39197Jan 23, 2024affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2
An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.
- CVE-2022-2602Jan 8, 2024affected < 5.14.21-150400.24.38.1fixed 5.14.21-150400.24.38.1
io_uring UAF, Unix SCM garbage collection
- CVE-2022-2588Jan 8, 2024affected < 5.14.21-150400.24.21.2fixed 5.14.21-150400.24.21.2
It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.
- affected < 5.14.21-150400.24.28.1fixed 5.14.21-150400.24.28.1
It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.
- CVE-2022-2585Jan 8, 2024affected < 5.14.21-150400.24.18.1fixed 5.14.21-150400.24.18.1
It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.
- CVE-2023-34324Jan 5, 2024affected < 5.14.21-150400.24.97.1fixed 5.14.21-150400.24.97.1
Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. t
- CVE-2023-6176Nov 16, 2023affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2
A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escal
- CVE-2023-39198Nov 9, 2023affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2
A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the ret
- CVE-2023-6039Nov 9, 2023affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2
A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.
- CVE-2023-1192Nov 1, 2023affected < 5.14.21-150400.24.92.1fixed 5.14.21-150400.24.92.1
A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access
- CVE-2023-5178Nov 1, 2023affected < 5.14.21-150400.24.97.1fixed 5.14.21-150400.24.97.1
A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote c
- CVE-2023-46862Oct 29, 2023affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2
An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.
- CVE-2023-5717Oct 25, 2023affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2
A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can i
- CVE-2023-45871Oct 15, 2023affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2
An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
- CVE-2023-45863Oct 14, 2023affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2
An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.
- CVE-2023-39194Oct 9, 2023affected < 5.14.21-150400.24.92.1fixed 5.14.21-150400.24.92.1
A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds re
- CVE-2023-39193Oct 9, 2023affected < 5.14.21-150400.24.97.1fixed 5.14.21-150400.24.97.1
A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
Page 1 of 16