rpm package
suse/kernel-rt&distro=SUSE Linux Enterprise Micro 5.5
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5
Vulnerabilities (4,620)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-31248 | — | < 5.14.21-150500.13.109.1 | 5.14.21-150500.13.109.1 | Jul 5, 2023 | Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace | ||
| CVE-2023-1206 | — | < 5.14.21-150500.13.21.1 | 5.14.21-150500.13.21.1 | Jun 30, 2023 | A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that acc | ||
| CVE-2023-35827 | — | < 5.14.21-150500.13.47.1 | 5.14.21-150500.13.47.1 | Jun 18, 2023 | An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c. | ||
| CVE-2023-3111 | — | < 5.14.21-150500.13.100.2 | 5.14.21-150500.13.100.2 | Jun 5, 2023 | A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag(). | ||
| CVE-2023-1859 | — | < 5.14.21-150500.13.18.1 | 5.14.21-150500.13.18.1 | May 17, 2023 | A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak. | ||
| CVE-2023-28410 | — | < 5.14.21-150500.13.91.1 | 5.14.21-150500.13.91.1 | May 10, 2023 | Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||
| CVE-2023-31085 | — | < 5.14.21-150500.13.24.1 | 5.14.21-150500.13.24.1 | Apr 24, 2023 | An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0. | ||
| CVE-2023-2007 | — | < 5.14.21-150500.13.18.1 | 5.14.21-150500.13.18.1 | Apr 24, 2023 | The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in t | ||
| CVE-2023-2006 | — | < 5.14.21-150500.13.27.2 | 5.14.21-150500.13.27.2 | Apr 24, 2023 | A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary cod | ||
| CVE-2023-2177 | — | < 5.14.21-150500.13.18.1 | 5.14.21-150500.13.18.1 | Apr 20, 2023 | A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a | ||
| CVE-2023-28328 | — | < 5.14.21-150500.13.109.1 | 5.14.21-150500.13.109.1 | Apr 19, 2023 | A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially caus | ||
| CVE-2023-28327 | — | < 5.14.21-150500.13.76.1 | 5.14.21-150500.13.76.1 | Apr 19, 2023 | A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service. | ||
| CVE-2023-2166 | — | < 5.14.21-150500.13.76.1 | 5.14.21-150500.13.76.1 | Apr 19, 2023 | A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service. | ||
| CVE-2023-2162 | — | < 5.14.21-150500.13.91.1 | 5.14.21-150500.13.91.1 | Apr 19, 2023 | A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information. | ||
| CVE-2023-1382 | — | < 5.14.21-150500.13.82.1 | 5.14.21-150500.13.82.1 | Apr 19, 2023 | A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel. | ||
| CVE-2023-1829 | — | < 5.14.21-150500.13.58.1 | 5.14.21-150500.13.58.1 | Apr 12, 2023 | A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying struc | ||
| CVE-2023-1990 | — | < 5.14.21-150500.13.97.1 | 5.14.21-150500.13.97.1 | Apr 12, 2023 | A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem. | ||
| CVE-2023-1582 | — | < 5.14.21-150500.13.64.1 | 5.14.21-150500.13.64.1 | Apr 5, 2023 | A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service. | ||
| CVE-2022-4744 | — | < 5.14.21-150500.13.47.1 | 5.14.21-150500.13.47.1 | Mar 30, 2023 | A double-free flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the | ||
| CVE-2023-1652 | Hig | 7.1 | < 5.14.21-150500.13.91.1 | 5.14.21-150500.13.91.1 | Mar 29, 2023 | A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem. |
- CVE-2023-31248Jul 5, 2023affected < 5.14.21-150500.13.109.1fixed 5.14.21-150500.13.109.1
Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace
- CVE-2023-1206Jun 30, 2023affected < 5.14.21-150500.13.21.1fixed 5.14.21-150500.13.21.1
A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that acc
- CVE-2023-35827Jun 18, 2023affected < 5.14.21-150500.13.47.1fixed 5.14.21-150500.13.47.1
An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.
- CVE-2023-3111Jun 5, 2023affected < 5.14.21-150500.13.100.2fixed 5.14.21-150500.13.100.2
A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().
- CVE-2023-1859May 17, 2023affected < 5.14.21-150500.13.18.1fixed 5.14.21-150500.13.18.1
A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.
- CVE-2023-28410May 10, 2023affected < 5.14.21-150500.13.91.1fixed 5.14.21-150500.13.91.1
Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
- CVE-2023-31085Apr 24, 2023affected < 5.14.21-150500.13.24.1fixed 5.14.21-150500.13.24.1
An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0.
- CVE-2023-2007Apr 24, 2023affected < 5.14.21-150500.13.18.1fixed 5.14.21-150500.13.18.1
The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in t
- CVE-2023-2006Apr 24, 2023affected < 5.14.21-150500.13.27.2fixed 5.14.21-150500.13.27.2
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary cod
- CVE-2023-2177Apr 20, 2023affected < 5.14.21-150500.13.18.1fixed 5.14.21-150500.13.18.1
A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a
- CVE-2023-28328Apr 19, 2023affected < 5.14.21-150500.13.109.1fixed 5.14.21-150500.13.109.1
A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially caus
- CVE-2023-28327Apr 19, 2023affected < 5.14.21-150500.13.76.1fixed 5.14.21-150500.13.76.1
A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.
- CVE-2023-2166Apr 19, 2023affected < 5.14.21-150500.13.76.1fixed 5.14.21-150500.13.76.1
A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.
- CVE-2023-2162Apr 19, 2023affected < 5.14.21-150500.13.91.1fixed 5.14.21-150500.13.91.1
A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.
- CVE-2023-1382Apr 19, 2023affected < 5.14.21-150500.13.82.1fixed 5.14.21-150500.13.82.1
A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.
- CVE-2023-1829Apr 12, 2023affected < 5.14.21-150500.13.58.1fixed 5.14.21-150500.13.58.1
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying struc
- CVE-2023-1990Apr 12, 2023affected < 5.14.21-150500.13.97.1fixed 5.14.21-150500.13.97.1
A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.
- CVE-2023-1582Apr 5, 2023affected < 5.14.21-150500.13.64.1fixed 5.14.21-150500.13.64.1
A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.
- CVE-2022-4744Mar 30, 2023affected < 5.14.21-150500.13.47.1fixed 5.14.21-150500.13.47.1
A double-free flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the
- affected < 5.14.21-150500.13.91.1fixed 5.14.21-150500.13.91.1
A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.
Page 229 of 231