VYPR

rpm package

suse/kernel-livepatch-SLE15-SP4_Update_11&distro=SUSE Linux Enterprise Live Patching 15 SP4

pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_11&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4

Vulnerabilities (32)

  • CVE-2023-51779HigFeb 29, 2024
    affected < 11-150400.2.3fixed 11-150400.2.3

    bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.

  • CVE-2023-6531Jan 21, 2024
    affected < 11-150400.2.3fixed 11-150400.2.3

    A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.

  • CVE-2023-46813Oct 27, 2023
    affected < 11-150400.2.3fixed 11-150400.2.3

    An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to ke

  • CVE-2023-5345Oct 3, 2023
    affected < 8-150400.2.1fixed 8-150400.2.1

    A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We

  • CVE-2023-2163Sep 20, 2023
    affected < 8-150400.2.1fixed 8-150400.2.1

    Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.

  • CVE-2023-4622Sep 6, 2023
    affected < 8-150400.2.1fixed 8-150400.2.1

    A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where uni

  • CVE-2023-3777Sep 6, 2023
    affected < 8-150400.2.1fixed 8-150400.2.1

    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release

  • CVE-2023-3610Jul 21, 2023
    affected < 8-150400.2.1fixed 8-150400.2.1

    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET

  • CVE-2023-35001Jul 5, 2023
    affected < 5-150400.2.1fixed 5-150400.2.1

    Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace

  • CVE-2023-3090Jun 28, 2023
    affected < 5-150400.2.1fixed 5-150400.2.1

    A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation. The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_

  • CVE-2023-2156May 9, 2023
    affected < 5-150400.2.1fixed 5-150400.2.1

    A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create

  • CVE-2023-32233May 8, 2023
    affected < 5-150400.2.1fixed 5-150400.2.1

    In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mis

  • CVE-2023-31436Apr 28, 2023
    affected < 3-150400.2.2fixed 3-150400.2.2

    qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.

  • CVE-2023-2176Apr 20, 2023
    affected < 5-150400.2.1fixed 5-150400.2.1

    A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.

  • CVE-2023-28327Apr 19, 2023
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.

  • CVE-2023-2162Apr 19, 2023
    affected < 2-150400.2.3fixed 2-150400.2.3

    A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.

  • CVE-2023-1838Apr 5, 2023
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.

  • CVE-2023-1582Apr 5, 2023
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.

  • CVE-2023-1611Apr 3, 2023
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea

  • CVE-2023-28464Mar 31, 2023
    affected < 1-150400.9.3.2fixed 1-150400.9.3.2

    hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.

Page 1 of 2