VYPR

rpm package

suse/kernel-syms&distro=SUSE Enterprise Storage 7

pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%207

Vulnerabilities (279)

  • CVE-2022-28693MedFeb 14, 2025
    affected < 5.3.18-150200.24.139.1fixed 5.3.18-150200.24.139.1

    Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

  • CVE-2022-21505Dec 24, 2024
    affected < 5.3.18-150200.24.126.1fixed 5.3.18-150200.24.126.1

    In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Secure Boot is enabled, but this

  • CVE-2022-2602Jan 8, 2024
    affected < 5.3.18-150200.24.139.1fixed 5.3.18-150200.24.139.1

    io_uring UAF, Unix SCM garbage collection

  • CVE-2022-2588Jan 8, 2024
    affected < 5.3.18-150200.24.129.1fixed 5.3.18-150200.24.129.1

    It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.

  • CVE-2022-2586KEVJan 8, 2024
    affected < 5.3.18-150200.24.134.1fixed 5.3.18-150200.24.134.1

    It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.

  • CVE-2022-22942Dec 13, 2023
    affected < 5.3.18-24.102.1fixed 5.3.18-24.102.1

    The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.

  • CVE-2023-3090Jun 28, 2023
    affected < 5.3.18-150200.24.157.1fixed 5.3.18-150200.24.157.1

    A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation. The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_

  • CVE-2023-3358Jun 28, 2023
    affected < 5.3.18-150200.24.157.1fixed 5.3.18-150200.24.157.1

    A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system.

  • CVE-2023-35828Jun 18, 2023
    affected < 5.3.18-150200.24.157.1fixed 5.3.18-150200.24.157.1

    An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.

  • CVE-2023-35824Jun 18, 2023
    affected < 5.3.18-150200.24.157.1fixed 5.3.18-150200.24.157.1

    An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.

  • CVE-2023-35823Jun 18, 2023
    affected < 5.3.18-150200.24.157.1fixed 5.3.18-150200.24.157.1

    An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.

  • CVE-2023-35788Jun 16, 2023
    affected < 5.3.18-150200.24.157.1fixed 5.3.18-150200.24.157.1

    An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.

  • CVE-2023-3268Jun 16, 2023
    affected < 5.3.18-150200.24.157.1fixed 5.3.18-150200.24.157.1

    An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.

  • CVE-2023-3161Jun 12, 2023
    affected < 5.3.18-150200.24.157.1fixed 5.3.18-150200.24.157.1

    A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.

  • CVE-2023-3159Jun 12, 2023
    affected < 5.3.18-150200.24.157.1fixed 5.3.18-150200.24.157.1

    A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.

  • CVE-2023-3141Jun 9, 2023
    affected < 5.3.18-150200.24.157.1fixed 5.3.18-150200.24.157.1

    A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.

  • CVE-2023-2002May 26, 2023
    affected < 5.3.18-150200.24.157.1fixed 5.3.18-150200.24.157.1

    A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availabil

  • CVE-2023-33288May 22, 2023
    affected < 5.3.18-150200.24.154.1fixed 5.3.18-150200.24.154.1

    An issue was discovered in the Linux kernel before 6.2.9. A use-after-free was found in bq24190_remove in drivers/power/supply/bq24190_charger.c. It could allow a local attacker to crash the system due to a race condition.

  • CVE-2020-36694May 21, 2023
    affected < 5.3.18-150200.24.154.1fixed 5.3.18-150200.24.154.1

    An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capa

  • CVE-2023-2124May 15, 2023
    affected < 5.3.18-150200.24.154.1fixed 5.3.18-150200.24.154.1

    An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.

Page 1 of 14