VYPR

rpm package

suse/kernel-default-base&distro=SUSE Linux Enterprise Micro 5.2

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Vulnerabilities (1,696)

  • CVE-2023-23004Mar 1, 2023
    affected < 5.3.18-150300.59.118.1.150300.18.68.1fixed 5.3.18-150300.59.118.1.150300.18.68.1

    In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-23000Mar 1, 2023
    affected < 5.3.18-150300.59.115.2.150300.18.66.1fixed 5.3.18-150300.59.115.2.150300.18.66.1

    In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.

  • CVE-2023-0461Feb 28, 2023
    affected < 5.3.18-150300.59.118.1.150300.18.68.1fixed 5.3.18-150300.59.118.1.150300.18.68.1

    There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege

  • CVE-2023-22998Feb 28, 2023
    affected < 5.3.18-150300.59.115.2.150300.18.66.1fixed 5.3.18-150300.59.115.2.150300.18.66.1

    In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-22995Feb 28, 2023
    affected < 5.3.18-150300.59.115.2.150300.18.66.1fixed 5.3.18-150300.59.115.2.150300.18.66.1

    In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.

  • CVE-2023-1095Feb 28, 2023
    affected < 5.3.18-150300.59.118.1.150300.18.68.1fixed 5.3.18-150300.59.118.1.150300.18.68.1

    In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer deref

  • CVE-2023-26545Feb 25, 2023
    affected < 5.3.18-150300.59.115.2.150300.18.66.1fixed 5.3.18-150300.59.115.2.150300.18.66.1

    In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.

  • CVE-2023-0597Feb 23, 2023
    affected < 5.3.18-150300.59.115.2.150300.18.66.1fixed 5.3.18-150300.59.115.2.150300.18.66.1

    A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected l

  • CVE-2023-23586Feb 17, 2023
    affected < 5.3.18-150300.59.124.1.150300.18.72.1fixed 5.3.18-150300.59.124.1.150300.18.72.1

    Due to a vulnerability in the io_uring subsystem, it is possible to leak kernel memory information to the user process. timens_install calls current_is_single_threaded to determine if the current process is single-threaded, but this call does not consider io_uring's io_worker thr

  • CVE-2023-25012Feb 1, 2023
    affected < 5.3.18-150300.59.118.1.150300.18.68.1fixed 5.3.18-150300.59.118.1.150300.18.68.1

    The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.

  • CVE-2023-0266KEVJan 30, 2023
    affected < 5.3.18-150300.59.109.1.150300.18.62.1fixed 5.3.18-150300.59.109.1.150300.18.62.1

    A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgradin

  • CVE-2022-4139Jan 27, 2023
    affected < 5.3.18-150300.59.106.1.150300.18.60.2fixed 5.3.18-150300.59.106.1.150300.18.60.2

    An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.

  • CVE-2023-0394Jan 24, 2023
    affected < 5.3.18-150300.59.118.1.150300.18.68.1fixed 5.3.18-150300.59.118.1.150300.18.68.1

    A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.

  • CVE-2022-47929Jan 17, 2023
    affected < 5.3.18-150300.59.109.1.150300.18.62.1fixed 5.3.18-150300.59.109.1.150300.18.62.1

    In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This aff

  • CVE-2022-41858Jan 17, 2023
    affected < 5.3.18-150300.59.106.1.150300.18.60.2fixed 5.3.18-150300.59.106.1.150300.18.60.2

    A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.

  • CVE-2023-23559Jan 13, 2023
    affected < 5.3.18-150300.59.115.2.150300.18.66.1fixed 5.3.18-150300.59.115.2.150300.18.66.1

    In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.

  • CVE-2023-23455Jan 12, 2023
    affected < 5.3.18-150300.59.109.1.150300.18.62.1fixed 5.3.18-150300.59.109.1.150300.18.62.1

    atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).

  • CVE-2023-23454Jan 12, 2023
    affected < 5.3.18-150300.59.109.1.150300.18.62.1fixed 5.3.18-150300.59.109.1.150300.18.62.1

    cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).

  • CVE-2022-3628Jan 12, 2023
    affected < 5.3.18-150300.59.106.1.150300.18.60.2fixed 5.3.18-150300.59.106.1.150300.18.60.2

    A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.

  • CVE-2022-2196Jan 9, 2023
    affected < 5.3.18-150300.59.121.2.150300.18.70.2fixed 5.3.18-150300.59.121.2.150300.18.70.2

    A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker a

Page 76 of 85