VYPR

rpm package

suse/kernel-source-rt&distro=SUSE Linux Enterprise Micro 5.2

pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Vulnerabilities (1,394)

  • CVE-2023-52439Feb 20, 2024
    affected < 5.3.18-150300.161.1fixed 5.3.18-150300.161.1

    In the Linux kernel, the following vulnerability has been resolved: uio: Fix use-after-free in uio_open core-1 core-2 ------------------------------------------------------- uio_unregister_device uio_open idev = idr_find() device_unregister(&idev->dev) put_device(&idev-

  • CVE-2024-26581Feb 20, 2024
    affected < 5.3.18-150300.172.1fixed 5.3.18-150300.172.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not

  • CVE-2023-52433Feb 20, 2024
    affected < 5.3.18-150300.172.1fixed 5.3.18-150300.172.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction New elements in this transaction might expired before such transaction ends. Skip sync GC for such elements otherwise commit path mig

  • CVE-2023-52429Feb 12, 2024
    affected < 5.3.18-150300.161.1fixed 5.3.18-150300.161.1

    dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.

  • CVE-2024-1151Feb 11, 2024
    affected < 5.3.18-150300.161.1fixed 5.3.18-150300.161.1

    A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflo

  • CVE-2024-23307MedJan 25, 2024
    affected < 5.3.18-150300.169.1fixed 5.3.18-150300.169.1

    Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.

  • CVE-2024-22099MedJan 25, 2024
    affected < 5.3.18-150300.166.1fixed 5.3.18-150300.166.1

    NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C. This issue affects Linux kernel: v2.6.12-rc2.

  • CVE-2023-39197Jan 23, 2024
    affected < 5.3.18-150300.223.1fixed 5.3.18-150300.223.1

    An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.

  • CVE-2024-23851Jan 23, 2024
    affected < 5.3.18-150300.161.1fixed 5.3.18-150300.161.1

    copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel->data_size check. This is related to ctl_ioctl.

  • CVE-2024-23849Jan 23, 2024
    affected < 5.3.18-150300.161.1fixed 5.3.18-150300.161.1

    In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.

  • CVE-2023-51042Jan 23, 2024
    affected < 5.3.18-150300.161.1fixed 5.3.18-150300.161.1

    In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.

  • CVE-2023-46343Jan 23, 2024
    affected < 5.3.18-150300.161.1fixed 5.3.18-150300.161.1

    In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c.

  • CVE-2023-6531Jan 21, 2024
    affected < 5.3.18-150300.166.1fixed 5.3.18-150300.166.1

    A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.

  • CVE-2024-0607Jan 18, 2024
    affected < 5.3.18-150300.161.1fixed 5.3.18-150300.161.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has

  • CVE-2024-0639Jan 17, 2024
    affected < 5.3.18-150300.169.1fixed 5.3.18-150300.169.1

    A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.

  • CVE-2024-0340Jan 9, 2024
    affected < 5.3.18-150300.161.1fixed 5.3.18-150300.161.1

    A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local pri

  • CVE-2022-2602Jan 8, 2024
    affected < 5.3.18-150300.223.1fixed 5.3.18-150300.223.1

    io_uring UAF, Unix SCM garbage collection

  • CVE-2022-2586KEVJan 8, 2024
    affected < 5.3.18-150300.214.1fixed 5.3.18-150300.214.1

    It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.

  • CVE-2023-6270Jan 4, 2024
    affected < 5.3.18-150300.166.1fixed 5.3.18-150300.166.1

    A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` glob

  • CVE-2023-7192Jan 2, 2024
    affected < 5.3.18-150300.166.1fixed 5.3.18-150300.166.1

    A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow.

Page 67 of 70