VYPR

rpm package

suse/kernel-default-base&distro=SUSE Linux Enterprise Micro 5.4

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.4

Vulnerabilities (2,957)

  • CVE-2022-4095Mar 22, 2023
    affected < 5.14.21-150400.24.170.2.150400.24.86.2fixed 5.14.21-150400.24.170.2.150400.24.86.2

    A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.

  • CVE-2023-28466Mar 15, 2023
    affected < 5.14.21-150400.24.60.1.150400.24.24.3fixed 5.14.21-150400.24.60.1.150400.24.24.3

    do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).

  • CVE-2023-1118Mar 2, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.

  • CVE-2023-23006Mar 1, 2023
    affected < 5.14.21-150400.24.63.1.150400.24.27.1fixed 5.14.21-150400.24.63.1.150400.24.27.1

    In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-23004Mar 1, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-23001Mar 1, 2023
    affected < 5.14.21-150400.24.60.1.150400.24.24.3fixed 5.14.21-150400.24.60.1.150400.24.24.3

    In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-23000Mar 1, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.

  • CVE-2023-0461Feb 28, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege

  • CVE-2023-22998Feb 28, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

  • CVE-2023-22995Feb 28, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.

  • CVE-2023-1095Feb 28, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer deref

  • CVE-2023-26545Feb 25, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.

  • CVE-2023-0597Feb 23, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected l

  • CVE-2023-25012Feb 1, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.

  • CVE-2023-0394Jan 24, 2023
    affected < 5.14.21-150400.24.60.1.150400.24.24.3fixed 5.14.21-150400.24.60.1.150400.24.24.3

    A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.

  • CVE-2023-23559Jan 13, 2023
    affected < 5.14.21-150400.24.55.3.150400.24.22.7fixed 5.14.21-150400.24.55.3.150400.24.22.7

    In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.

  • CVE-2022-4382Jan 10, 2023
    affected < 5.14.21-150400.24.133.2.150400.24.64.5fixed 5.14.21-150400.24.133.2.150400.24.64.5

    A use-after-free flaw caused by a race among the superblock operations in the gadgetfs Linux driver was found. It could be triggered by yanking out a device that is running the gadgetfs side.

  • CVE-2022-2196Jan 9, 2023
    affected < 5.14.21-150400.24.63.1.150400.24.27.1fixed 5.14.21-150400.24.63.1.150400.24.27.1

    A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker a

  • CVE-2022-4662Dec 22, 2022
    affected < 5.14.21-150400.24.170.2.150400.24.86.2fixed 5.14.21-150400.24.170.2.150400.24.86.2

    A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.

  • CVE-2022-4269Dec 5, 2022
    affected < 5.14.21-150400.24.66.1.150400.24.29.1fixed 5.14.21-150400.24.66.1.150400.24.29.1

    A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in