VYPR

rpm package

suse/kernel-syms-rt&distro=SUSE Real Time Module 15 SP4

pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP4

Vulnerabilities (277)

  • CVE-2023-5178Nov 1, 2023
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote c

  • CVE-2023-46862Oct 29, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.

  • CVE-2023-46813Oct 27, 2023
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to ke

  • CVE-2023-5717Oct 25, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can i

  • CVE-2023-45871Oct 15, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.

  • CVE-2023-45863Oct 14, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

  • CVE-2023-45862Oct 14, 2023
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

  • CVE-2023-39194Oct 9, 2023
    affected < 5.14.21-150400.15.56.1fixed 5.14.21-150400.15.56.1

    A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds re

  • CVE-2023-39193Oct 9, 2023
    affected < 5.14.21-150400.15.56.1fixed 5.14.21-150400.15.56.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

  • CVE-2023-39192Oct 9, 2023
    affected < 5.14.21-150400.15.56.1fixed 5.14.21-150400.15.56.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundarie

  • CVE-2023-39189Oct 9, 2023
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or inform

  • CVE-2023-42754Oct 5, 2023
    affected < 5.14.21-150400.15.56.1fixed 5.14.21-150400.15.56.1

    A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with C

  • CVE-2023-5345Oct 3, 2023
    affected < 5.14.21-150400.15.56.1fixed 5.14.21-150400.15.56.1

    A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We

  • CVE-2023-42753Sep 25, 2023
    affected < 5.14.21-150400.15.56.1fixed 5.14.21-150400.15.56.1

    An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This iss

  • CVE-2023-5158Sep 25, 2023
    affected < 5.14.21-150400.15.62.1fixed 5.14.21-150400.15.62.1

    A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.

  • CVE-2023-34319Sep 22, 2023
    affected < 5.14.21-150400.15.53.1fixed 5.14.21-150400.15.53.1

    The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split

  • CVE-2023-2163Sep 20, 2023
    affected < 5.14.21-150400.15.59.1fixed 5.14.21-150400.15.59.1

    Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.

  • CVE-2023-4155Sep 13, 2023
    affected < 5.14.21-150400.15.56.1fixed 5.14.21-150400.15.56.1

    A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the

  • CVE-2023-4921Sep 12, 2023
    affected < 5.14.21-150400.15.56.1fixed 5.14.21-150400.15.56.1

    A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrec

  • CVE-2023-4623Sep 6, 2023
    affected < 5.14.21-150400.15.56.1fixed 5.14.21-150400.15.56.1

    A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curv

Page 2 of 14