rpm package
suse/kernel-docs&distro=SUSE Linux Enterprise Server 15 SP3-LTSS
pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS
Vulnerabilities (1,483)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-39197 | — | < 5.3.18-150300.59.144.1 | 5.3.18-150300.59.144.1 | Jan 23, 2024 | An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol. | ||
| CVE-2024-23851 | — | < 5.3.18-150300.59.153.2 | 5.3.18-150300.59.153.2 | Jan 23, 2024 | copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel->data_size check. This is related to ctl_ioctl. | ||
| CVE-2024-23849 | — | < 5.3.18-150300.59.153.2 | 5.3.18-150300.59.153.2 | Jan 23, 2024 | In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access. | ||
| CVE-2023-51043 | — | < 5.3.18-150300.59.150.1 | 5.3.18-150300.59.150.1 | Jan 23, 2024 | In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload. | ||
| CVE-2023-51042 | — | < 5.3.18-150300.59.153.2 | 5.3.18-150300.59.153.2 | Jan 23, 2024 | In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free. | ||
| CVE-2023-46343 | — | < 5.3.18-150300.59.153.2 | 5.3.18-150300.59.153.2 | Jan 23, 2024 | In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c. | ||
| CVE-2024-0775 | — | < 5.3.18-150300.59.150.1 | 5.3.18-150300.59.150.1 | Jan 22, 2024 | A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free. | ||
| CVE-2023-6531 | — | < 5.3.18-150300.59.158.1 | 5.3.18-150300.59.158.1 | Jan 21, 2024 | A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on. | ||
| CVE-2024-0607 | — | < 5.3.18-150300.59.153.2 | 5.3.18-150300.59.153.2 | Jan 18, 2024 | A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has | ||
| CVE-2021-33631 | — | < 5.3.18-150300.59.150.1 | 5.3.18-150300.59.150.1 | Jan 18, 2024 | Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0. | ||
| CVE-2024-0639 | — | < 5.3.18-150300.59.161.2 | 5.3.18-150300.59.161.2 | Jan 17, 2024 | A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system. | ||
| CVE-2024-0565 | — | < 5.3.18-150300.59.150.1 | 5.3.18-150300.59.150.1 | Jan 15, 2024 | An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service. | ||
| CVE-2023-6915 | — | < 5.3.18-150300.59.150.1 | 5.3.18-150300.59.150.1 | Jan 15, 2024 | A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return. | ||
| CVE-2023-6040 | — | < 5.3.18-150300.59.150.1 | 5.3.18-150300.59.150.1 | Jan 12, 2024 | An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_ | ||
| CVE-2024-0340 | — | < 5.3.18-150300.59.153.2 | 5.3.18-150300.59.153.2 | Jan 9, 2024 | A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local pri | ||
| CVE-2022-2602 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Jan 8, 2024 | io_uring UAF, Unix SCM garbage collection | ||
| CVE-2022-2586 | — | KEV | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jan 8, 2024 | It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted. | |
| CVE-2023-34324 | — | < 5.3.18-150300.59.141.2 | 5.3.18-150300.59.141.2 | Jan 5, 2024 | Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. t | ||
| CVE-2023-6270 | — | < 5.3.18-150300.59.158.1 | 5.3.18-150300.59.158.1 | Jan 4, 2024 | A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` glob | ||
| CVE-2023-7192 | — | < 5.3.18-150300.59.158.1 | 5.3.18-150300.59.158.1 | Jan 2, 2024 | A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow. |
- CVE-2023-39197Jan 23, 2024affected < 5.3.18-150300.59.144.1fixed 5.3.18-150300.59.144.1
An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.
- CVE-2024-23851Jan 23, 2024affected < 5.3.18-150300.59.153.2fixed 5.3.18-150300.59.153.2
copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel->data_size check. This is related to ctl_ioctl.
- CVE-2024-23849Jan 23, 2024affected < 5.3.18-150300.59.153.2fixed 5.3.18-150300.59.153.2
In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.
- CVE-2023-51043Jan 23, 2024affected < 5.3.18-150300.59.150.1fixed 5.3.18-150300.59.150.1
In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.
- CVE-2023-51042Jan 23, 2024affected < 5.3.18-150300.59.153.2fixed 5.3.18-150300.59.153.2
In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.
- CVE-2023-46343Jan 23, 2024affected < 5.3.18-150300.59.153.2fixed 5.3.18-150300.59.153.2
In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c.
- CVE-2024-0775Jan 22, 2024affected < 5.3.18-150300.59.150.1fixed 5.3.18-150300.59.150.1
A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.
- CVE-2023-6531Jan 21, 2024affected < 5.3.18-150300.59.158.1fixed 5.3.18-150300.59.158.1
A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.
- CVE-2024-0607Jan 18, 2024affected < 5.3.18-150300.59.153.2fixed 5.3.18-150300.59.153.2
A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has
- CVE-2021-33631Jan 18, 2024affected < 5.3.18-150300.59.150.1fixed 5.3.18-150300.59.150.1
Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.
- CVE-2024-0639Jan 17, 2024affected < 5.3.18-150300.59.161.2fixed 5.3.18-150300.59.161.2
A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.
- CVE-2024-0565Jan 15, 2024affected < 5.3.18-150300.59.150.1fixed 5.3.18-150300.59.150.1
An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
- CVE-2023-6915Jan 15, 2024affected < 5.3.18-150300.59.150.1fixed 5.3.18-150300.59.150.1
A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.
- CVE-2023-6040Jan 12, 2024affected < 5.3.18-150300.59.150.1fixed 5.3.18-150300.59.150.1
An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_
- CVE-2024-0340Jan 9, 2024affected < 5.3.18-150300.59.153.2fixed 5.3.18-150300.59.153.2
A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local pri
- CVE-2022-2602Jan 8, 2024affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
io_uring UAF, Unix SCM garbage collection
- affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.
- CVE-2023-34324Jan 5, 2024affected < 5.3.18-150300.59.141.2fixed 5.3.18-150300.59.141.2
Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. t
- CVE-2023-6270Jan 4, 2024affected < 5.3.18-150300.59.158.1fixed 5.3.18-150300.59.158.1
A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` glob
- CVE-2023-7192Jan 2, 2024affected < 5.3.18-150300.59.158.1fixed 5.3.18-150300.59.158.1
A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow.
Page 63 of 75