VYPR

rpm package

suse/kernel-zfcpdump&distro=SUSE Linux Enterprise Server 15 SP1-LTSS

pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS

Vulnerabilities (396)

  • CVE-2023-0461Feb 28, 2023
    affected < 4.12.14-150100.197.165.1fixed 4.12.14-150100.197.165.1

    There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege

  • CVE-2023-1095Feb 28, 2023
    affected < 4.12.14-150100.197.142.1fixed 4.12.14-150100.197.142.1

    In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer deref

  • CVE-2023-26545Feb 25, 2023
    affected < 4.12.14-150100.197.137.2fixed 4.12.14-150100.197.137.2

    In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.

  • CVE-2023-0597Feb 23, 2023
    affected < 4.12.14-150100.197.137.2fixed 4.12.14-150100.197.137.2

    A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected l

  • CVE-2023-0394Jan 24, 2023
    affected < 4.12.14-150100.197.142.1fixed 4.12.14-150100.197.142.1

    A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.

  • CVE-2022-47929Jan 17, 2023
    affected < 4.12.14-150100.197.134.1fixed 4.12.14-150100.197.134.1

    In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This aff

  • CVE-2022-41858Jan 17, 2023
    affected < 4.12.14-150100.197.131.1fixed 4.12.14-150100.197.131.1

    A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.

  • CVE-2023-23559Jan 13, 2023
    affected < 4.12.14-150100.197.137.2fixed 4.12.14-150100.197.137.2

    In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.

  • CVE-2023-23455Jan 12, 2023
    affected < 4.12.14-150100.197.142.1fixed 4.12.14-150100.197.142.1

    atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).

  • CVE-2023-23454Jan 12, 2023
    affected < 4.12.14-150100.197.134.1fixed 4.12.14-150100.197.134.1

    cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).

  • CVE-2022-3628Jan 12, 2023
    affected < 4.12.14-150100.197.131.1fixed 4.12.14-150100.197.131.1

    A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.

  • CVE-2022-4378Jan 5, 2023
    affected < 4.12.14-150100.197.131.1fixed 4.12.14-150100.197.131.1

    A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

  • CVE-2022-4662Dec 22, 2022
    affected < 4.12.14-150100.197.134.1fixed 4.12.14-150100.197.134.1

    A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.

  • CVE-2022-20567Dec 16, 2022
    affected < 4.12.14-150100.197.142.1fixed 4.12.14-150100.197.142.1

    In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid

  • CVE-2022-3108Dec 14, 2022
    affected < 4.12.14-150100.197.134.1fixed 4.12.14-150100.197.134.1

    An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().

  • CVE-2022-3107Dec 14, 2022
    affected < 4.12.14-150100.197.134.1fixed 4.12.14-150100.197.134.1

    An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.

  • CVE-2022-42329Dec 7, 2022
    affected < 4.12.14-150100.197.131.1fixed 4.12.14-150100.197.131.1

    Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free

  • CVE-2022-42328Dec 7, 2022
    affected < 4.12.14-150100.197.131.1fixed 4.12.14-150100.197.131.1

    Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free

  • CVE-2022-3643Dec 7, 2022
    affected < 4.12.14-150100.197.131.1fixed 4.12.14-150100.197.131.1

    Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux networ

  • CVE-2022-4129Nov 28, 2022
    affected < 4.12.14-150100.197.137.2fixed 4.12.14-150100.197.137.2

    A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.

Page 6 of 20