VYPR

rpm package

suse/kernel-default-base&distro=SUSE Linux Enterprise Micro 5.3

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.3

Vulnerabilities (3,014)

  • CVE-2023-0386KEVMar 22, 2023
    affected < 5.14.21-150400.24.63.1.150400.24.27.1fixed 5.14.21-150400.24.63.1.150400.24.27.1

    A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a loca

  • CVE-2022-4095Mar 22, 2023
    affected < 5.14.21-150400.24.170.2.150400.24.86.2fixed 5.14.21-150400.24.170.2.150400.24.86.2

    A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.

  • CVE-2023-28466Mar 15, 2023
    affected < 5.14.21-150400.24.60.1.150400.24.24.3fixed 5.14.21-150400.24.60.1.150400.24.24.3

    do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).

  • CVE-2022-3424Mar 6, 2023
    affected < 5.14.21-150400.24.33.2.150400.24.11.4fixed 5.14.21-150400.24.33.2.150400.24.11.4

    A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate

  • CVE-2023-1118Mar 2, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.

  • CVE-2023-23006Mar 1, 2023
    affected < 5.14.21-150400.24.63.1.150400.24.27.1fixed 5.14.21-150400.24.63.1.150400.24.27.1

    In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-23004Mar 1, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-23001Mar 1, 2023
    affected < 5.14.21-150400.24.60.1.150400.24.24.3fixed 5.14.21-150400.24.60.1.150400.24.24.3

    In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-23000Mar 1, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.

  • CVE-2023-0461Feb 28, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege

  • CVE-2023-22998Feb 28, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-22995Feb 28, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.

  • CVE-2023-1095Feb 28, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer deref

  • CVE-2023-26545Feb 25, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.

  • CVE-2023-0597Feb 23, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected l

  • CVE-2023-25012Feb 1, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.

  • CVE-2023-0266KEVJan 30, 2023
    affected < 5.14.21-150400.24.46.1.150400.24.17.3fixed 5.14.21-150400.24.46.1.150400.24.17.3

    A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgradin

  • CVE-2023-0394Jan 24, 2023
    affected < 5.14.21-150400.24.60.1.150400.24.24.3fixed 5.14.21-150400.24.60.1.150400.24.24.3

    A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.

  • CVE-2023-0122Jan 17, 2023
    affected < 5.14.21-150400.24.46.1.150400.24.17.3fixed 5.14.21-150400.24.46.1.150400.24.17.3

    A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4.

  • CVE-2022-47929Jan 17, 2023
    affected < 5.14.21-150400.24.46.1.150400.24.17.3fixed 5.14.21-150400.24.46.1.150400.24.17.3

    In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This aff

Page 146 of 151