rpm package
suse/kernel-obs-build&distro=SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS
pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOS
Vulnerabilities (181)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-23006 | — | < 5.3.18-150300.59.115.2 | 5.3.18-150300.59.115.2 | Mar 1, 2023 | In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer). | ||
| CVE-2023-23004 | — | < 5.3.18-150300.59.118.1 | 5.3.18-150300.59.118.1 | Mar 1, 2023 | In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer). | ||
| CVE-2023-23000 | — | < 5.3.18-150300.59.115.2 | 5.3.18-150300.59.115.2 | Mar 1, 2023 | In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used. | ||
| CVE-2023-0461 | — | < 5.3.18-150300.59.118.1 | 5.3.18-150300.59.118.1 | Feb 28, 2023 | There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege | ||
| CVE-2023-22998 | — | < 5.3.18-150300.59.115.2 | 5.3.18-150300.59.115.2 | Feb 28, 2023 | In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer). | ||
| CVE-2023-22995 | — | < 5.3.18-150300.59.115.2 | 5.3.18-150300.59.115.2 | Feb 28, 2023 | In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls. | ||
| CVE-2023-1095 | — | < 5.3.18-150300.59.118.1 | 5.3.18-150300.59.118.1 | Feb 28, 2023 | In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer deref | ||
| CVE-2023-26545 | — | < 5.3.18-150300.59.115.2 | 5.3.18-150300.59.115.2 | Feb 25, 2023 | In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device. | ||
| CVE-2023-0597 | — | < 5.3.18-150300.59.115.2 | 5.3.18-150300.59.115.2 | Feb 23, 2023 | A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected l | ||
| CVE-2023-23586 | — | < 5.3.18-150300.59.124.1 | 5.3.18-150300.59.124.1 | Feb 17, 2023 | Due to a vulnerability in the io_uring subsystem, it is possible to leak kernel memory information to the user process. timens_install calls current_is_single_threaded to determine if the current process is single-threaded, but this call does not consider io_uring's io_worker thr | ||
| CVE-2023-25012 | — | < 5.3.18-150300.59.118.1 | 5.3.18-150300.59.118.1 | Feb 1, 2023 | The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long. | ||
| CVE-2023-0266 | — | KEV | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Jan 30, 2023 | A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgradin | |
| CVE-2022-4139 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Jan 27, 2023 | An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system. | ||
| CVE-2023-0394 | — | < 5.3.18-150300.59.118.1 | 5.3.18-150300.59.118.1 | Jan 24, 2023 | A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash. | ||
| CVE-2022-47929 | — | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Jan 17, 2023 | In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This aff | ||
| CVE-2022-41858 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Jan 17, 2023 | A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information. | ||
| CVE-2023-23559 | — | < 5.3.18-150300.59.115.2 | 5.3.18-150300.59.115.2 | Jan 13, 2023 | In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition. | ||
| CVE-2023-23455 | — | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Jan 12, 2023 | atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results). | ||
| CVE-2023-23454 | — | < 5.3.18-150300.59.109.1 | 5.3.18-150300.59.109.1 | Jan 12, 2023 | cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results). | ||
| CVE-2022-3628 | — | < 5.3.18-150300.59.106.1 | 5.3.18-150300.59.106.1 | Jan 12, 2023 | A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges. |
- CVE-2023-23006Mar 1, 2023affected < 5.3.18-150300.59.115.2fixed 5.3.18-150300.59.115.2
In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
- CVE-2023-23004Mar 1, 2023affected < 5.3.18-150300.59.118.1fixed 5.3.18-150300.59.118.1
In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
- CVE-2023-23000Mar 1, 2023affected < 5.3.18-150300.59.115.2fixed 5.3.18-150300.59.115.2
In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.
- CVE-2023-0461Feb 28, 2023affected < 5.3.18-150300.59.118.1fixed 5.3.18-150300.59.118.1
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege
- CVE-2023-22998Feb 28, 2023affected < 5.3.18-150300.59.115.2fixed 5.3.18-150300.59.115.2
In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
- CVE-2023-22995Feb 28, 2023affected < 5.3.18-150300.59.115.2fixed 5.3.18-150300.59.115.2
In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.
- CVE-2023-1095Feb 28, 2023affected < 5.3.18-150300.59.118.1fixed 5.3.18-150300.59.118.1
In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer deref
- CVE-2023-26545Feb 25, 2023affected < 5.3.18-150300.59.115.2fixed 5.3.18-150300.59.115.2
In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.
- CVE-2023-0597Feb 23, 2023affected < 5.3.18-150300.59.115.2fixed 5.3.18-150300.59.115.2
A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected l
- CVE-2023-23586Feb 17, 2023affected < 5.3.18-150300.59.124.1fixed 5.3.18-150300.59.124.1
Due to a vulnerability in the io_uring subsystem, it is possible to leak kernel memory information to the user process. timens_install calls current_is_single_threaded to determine if the current process is single-threaded, but this call does not consider io_uring's io_worker thr
- CVE-2023-25012Feb 1, 2023affected < 5.3.18-150300.59.118.1fixed 5.3.18-150300.59.118.1
The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.
- affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgradin
- CVE-2022-4139Jan 27, 2023affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.
- CVE-2023-0394Jan 24, 2023affected < 5.3.18-150300.59.118.1fixed 5.3.18-150300.59.118.1
A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
- CVE-2022-47929Jan 17, 2023affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This aff
- CVE-2022-41858Jan 17, 2023affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.
- CVE-2023-23559Jan 13, 2023affected < 5.3.18-150300.59.115.2fixed 5.3.18-150300.59.115.2
In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.
- CVE-2023-23455Jan 12, 2023affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
- CVE-2023-23454Jan 12, 2023affected < 5.3.18-150300.59.109.1fixed 5.3.18-150300.59.109.1
cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
- CVE-2022-3628Jan 12, 2023affected < 5.3.18-150300.59.106.1fixed 5.3.18-150300.59.106.1
A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.
Page 7 of 10