VYPR

rpm package

suse/kernel-rt&distro=SUSE Linux Micro 6.0

pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Micro%206.0

Vulnerabilities (4,438)

  • CVE-2024-26582Feb 21, 2024
    affected < 6.4.0-9.1fixed 6.4.0-9.1

    In the Linux kernel, the following vulnerability has been resolved: net: tls: fix use-after-free with partial reads and async decrypt tls_decrypt_sg doesn't take a reference on the pages from clear_skb, so the put_page() in tls_decrypt_done releases them, and we trigger a use-a

  • CVE-2023-52435Feb 20, 2024
    affected < 6.4.0-9.1fixed 6.4.0-9.1

    In the Linux kernel, the following vulnerability has been resolved: net: prevent mss overflow in skb_segment() Once again syzbot is able to crash the kernel in skb_segment() [1] GSO_BY_FRAGS is a forbidden value, but unfortunately the following computation in skb_segment() can

  • CVE-2023-52434Feb 20, 2024
    affected < 6.4.0-9.1fixed 6.4.0-9.1

    In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential OOBs in smb2_parse_contexts() Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts(). This fixes following oops when accessing invalid create cont

  • CVE-2024-25741Feb 12, 2024
    affected < 6.4.0-9.1fixed 6.4.0-9.1

    printer_write in drivers/usb/gadget/function/f_printer.c in the Linux kernel through 6.7.4 does not properly call usb_ep_queue, which might allow attackers to cause a denial of service or have unspecified other impact.

  • CVE-2024-22099MedJan 25, 2024
    affected < 6.4.0-25.1fixed 6.4.0-25.1

    NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C. This issue affects Linux kernel: v2.6.12-rc2.

  • CVE-2024-23848MedJan 23, 2024
    affected < 6.4.0-9.1fixed 6.4.0-9.1

    In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.

  • CVE-2023-39197Jan 23, 2024
    affected < 6.4.0-37.1fixed 6.4.0-37.1

    An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.

  • CVE-2024-0639Jan 17, 2024
    affected < 6.4.0-9.1fixed 6.4.0-9.1

    A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.

  • CVE-2023-6270Jan 4, 2024
    affected < 6.4.0-22.1fixed 6.4.0-22.1

    A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` glob

  • CVE-2023-51780Dec 25, 2023
    affected < 6.4.0-9.1fixed 6.4.0-9.1

    An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.

  • CVE-2023-6238Nov 21, 2023
    affected < 6.4.0-9.1fixed 6.4.0-9.1

    A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing r

  • CVE-2023-47233MedNov 3, 2023
    affected < 6.4.0-25.1fixed 6.4.0-25.1

    The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this "could be exploited in a real world scenario." This is r

  • CVE-2023-42752Oct 13, 2023
    affected < 6.4.0-40.1fixed 6.4.0-40.1

    An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.

  • CVE-2023-42753Sep 25, 2023
    affected < 6.4.0-37.1fixed 6.4.0-37.1

    An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This iss

  • CVE-2023-3772Jul 25, 2023
    affected < 6.4.0-37.1fixed 6.4.0-37.1

    A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of s

  • CVE-2023-0160Jul 18, 2023
    affected < 6.4.0-9.1fixed 6.4.0-9.1

    A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system.

  • CVE-2023-31248Jul 5, 2023
    affected < 6.4.0-37.1fixed 6.4.0-37.1

    Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace

  • CVE-2019-11135Nov 14, 2019
    affected < 6.4.0-35.1fixed 6.4.0-35.1

    TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

Page 222 of 222