VYPR

rpm package

suse/kernel-rt_debug&distro=SUSE Real Time Module 15 SP4

pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP4

Vulnerabilities (277)

  • CVE-2022-28693MedFeb 14, 2025
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

  • CVE-2023-4134Nov 14, 2024
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of ser

  • CVE-2023-51779HigFeb 29, 2024
    affected < 5.14.21-150400.15.65.1fixed 5.14.21-150400.15.65.1

    bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.

  • CVE-2023-39197Jan 23, 2024
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.

  • CVE-2023-6531Jan 21, 2024
    affected < 5.14.21-150400.15.65.1fixed 5.14.21-150400.15.65.1

    A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.

  • CVE-2022-2602Jan 8, 2024
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    io_uring UAF, Unix SCM garbage collection

  • CVE-2022-2588Jan 8, 2024
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.

  • CVE-2022-2586KEVJan 8, 2024
    affected < 5.14.21-150400.15.5.1fixed 5.14.21-150400.15.5.1

    It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.

  • CVE-2023-34324Jan 5, 2024
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. t

  • CVE-2023-6546Dec 21, 2023
    affected < 5.14.21-150400.15.65.1fixed 5.14.21-150400.15.65.1

    A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci

  • CVE-2023-6932HigDec 19, 2023
    affected < 5.14.21-150400.15.65.1fixed 5.14.21-150400.15.65.1

    A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recomme

  • CVE-2023-6931HigDec 19, 2023
    affected < 5.14.21-150400.15.65.1fixed 5.14.21-150400.15.65.1

    A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation. A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group(). We recomme

  • CVE-2023-6622Dec 8, 2023
    affected < 5.14.21-150400.15.65.1fixed 5.14.21-150400.15.65.1

    A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.

  • CVE-2023-6610Dec 8, 2023
    affected < 5.14.21-150400.15.65.1fixed 5.14.21-150400.15.65.1

    An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.

  • CVE-2023-6606Dec 8, 2023
    affected < 5.14.21-150400.15.65.1fixed 5.14.21-150400.15.65.1

    An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.

  • CVE-2023-6176Nov 16, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escal

  • CVE-2023-6121MedNov 16, 2023
    affected < 5.14.21-150400.15.65.1fixed 5.14.21-150400.15.65.1

    An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the ke

  • CVE-2023-39198Nov 9, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the ret

  • CVE-2023-6039Nov 9, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.

  • CVE-2023-1192Nov 1, 2023
    affected < 5.14.21-150400.15.56.1fixed 5.14.21-150400.15.56.1

    A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access

Page 1 of 14