rpm package
suse/kernel-source&distro=SUSE Linux Enterprise Module for Development Tools 15 SP4
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4
Vulnerabilities (314)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-39192 | — | < 5.14.21-150400.24.92.1 | 5.14.21-150400.24.92.1 | Oct 9, 2023 | A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundarie | ||
| CVE-2023-39189 | — | < 5.14.21-150400.24.97.1 | 5.14.21-150400.24.97.1 | Oct 9, 2023 | A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or inform | ||
| CVE-2023-42754 | — | < 5.14.21-150400.24.92.1 | 5.14.21-150400.24.92.1 | Oct 5, 2023 | A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with C | ||
| CVE-2023-5345 | — | < 5.14.21-150400.24.92.1 | 5.14.21-150400.24.92.1 | Oct 3, 2023 | A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We | ||
| CVE-2023-42753 | — | < 5.14.21-150400.24.92.1 | 5.14.21-150400.24.92.1 | Sep 25, 2023 | An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This iss | ||
| CVE-2023-5158 | — | < 5.14.21-150400.24.100.2 | 5.14.21-150400.24.100.2 | Sep 25, 2023 | A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor. | ||
| CVE-2023-34319 | — | < 5.14.21-150400.24.88.1 | 5.14.21-150400.24.88.1 | Sep 22, 2023 | The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split | ||
| CVE-2023-2163 | — | < 5.14.21-150400.24.97.1 | 5.14.21-150400.24.97.1 | Sep 20, 2023 | Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. | ||
| CVE-2023-4155 | — | < 5.14.21-150400.24.92.1 | 5.14.21-150400.24.92.1 | Sep 13, 2023 | A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the | ||
| CVE-2023-4921 | — | < 5.14.21-150400.24.92.1 | 5.14.21-150400.24.92.1 | Sep 12, 2023 | A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrec | ||
| CVE-2023-4623 | — | < 5.14.21-150400.24.92.1 | 5.14.21-150400.24.92.1 | Sep 6, 2023 | A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curv | ||
| CVE-2023-4622 | — | < 5.14.21-150400.24.92.1 | 5.14.21-150400.24.92.1 | Sep 6, 2023 | A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where uni | ||
| CVE-2023-4244 | — | < 5.14.21-150400.24.100.2 | 5.14.21-150400.24.100.2 | Sep 6, 2023 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to under | ||
| CVE-2023-3777 | — | < 5.14.21-150400.24.97.1 | 5.14.21-150400.24.97.1 | Sep 6, 2023 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release | ||
| CVE-2023-4569 | — | < 5.14.21-150400.24.88.1 | 5.14.21-150400.24.88.1 | Aug 28, 2023 | A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak. | ||
| CVE-2023-4459 | — | < 5.14.21-150400.24.88.1 | 5.14.21-150400.24.88.1 | Aug 21, 2023 | A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sani | ||
| CVE-2023-4389 | — | < 5.14.21-150400.24.92.1 | 5.14.21-150400.24.92.1 | Aug 16, 2023 | A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel informati | ||
| CVE-2023-4387 | — | < 5.14.21-150400.24.88.1 | 5.14.21-150400.24.88.1 | Aug 16, 2023 | A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, | ||
| CVE-2022-40982 | — | < 5.14.21-150400.24.81.1 | 5.14.21-150400.24.81.1 | Aug 11, 2023 | Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | ||
| CVE-2023-25775 | — | < 5.14.21-150400.24.100.2 | 5.14.21-150400.24.100.2 | Aug 11, 2023 | Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access. |
- CVE-2023-39192Oct 9, 2023affected < 5.14.21-150400.24.92.1fixed 5.14.21-150400.24.92.1
A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundarie
- CVE-2023-39189Oct 9, 2023affected < 5.14.21-150400.24.97.1fixed 5.14.21-150400.24.97.1
A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or inform
- CVE-2023-42754Oct 5, 2023affected < 5.14.21-150400.24.92.1fixed 5.14.21-150400.24.92.1
A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with C
- CVE-2023-5345Oct 3, 2023affected < 5.14.21-150400.24.92.1fixed 5.14.21-150400.24.92.1
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We
- CVE-2023-42753Sep 25, 2023affected < 5.14.21-150400.24.92.1fixed 5.14.21-150400.24.92.1
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This iss
- CVE-2023-5158Sep 25, 2023affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2
A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.
- CVE-2023-34319Sep 22, 2023affected < 5.14.21-150400.24.88.1fixed 5.14.21-150400.24.88.1
The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split
- CVE-2023-2163Sep 20, 2023affected < 5.14.21-150400.24.97.1fixed 5.14.21-150400.24.97.1
Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.
- CVE-2023-4155Sep 13, 2023affected < 5.14.21-150400.24.92.1fixed 5.14.21-150400.24.92.1
A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the
- CVE-2023-4921Sep 12, 2023affected < 5.14.21-150400.24.92.1fixed 5.14.21-150400.24.92.1
A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrec
- CVE-2023-4623Sep 6, 2023affected < 5.14.21-150400.24.92.1fixed 5.14.21-150400.24.92.1
A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curv
- CVE-2023-4622Sep 6, 2023affected < 5.14.21-150400.24.92.1fixed 5.14.21-150400.24.92.1
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where uni
- CVE-2023-4244Sep 6, 2023affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to under
- CVE-2023-3777Sep 6, 2023affected < 5.14.21-150400.24.97.1fixed 5.14.21-150400.24.97.1
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release
- CVE-2023-4569Aug 28, 2023affected < 5.14.21-150400.24.88.1fixed 5.14.21-150400.24.88.1
A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak.
- CVE-2023-4459Aug 21, 2023affected < 5.14.21-150400.24.88.1fixed 5.14.21-150400.24.88.1
A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sani
- CVE-2023-4389Aug 16, 2023affected < 5.14.21-150400.24.92.1fixed 5.14.21-150400.24.92.1
A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel informati
- CVE-2023-4387Aug 16, 2023affected < 5.14.21-150400.24.88.1fixed 5.14.21-150400.24.88.1
A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all,
- CVE-2022-40982Aug 11, 2023affected < 5.14.21-150400.24.81.1fixed 5.14.21-150400.24.81.1
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2023-25775Aug 11, 2023affected < 5.14.21-150400.24.100.2fixed 5.14.21-150400.24.100.2
Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Page 2 of 16