Slackware Linux update for kernel



Risk High
Patch available YES
Number of vulnerabilities 179
CVE-ID CVE-2023-52340
CVE-2023-6040
CVE-2024-0646
CVE-2023-46838
CVE-2023-52436
CVE-2023-52438
CVE-2023-52439
CVE-2023-52443
CVE-2023-52444
CVE-2023-52445
CVE-2023-52448
CVE-2023-52449
CVE-2023-52451
CVE-2023-52454
CVE-2023-52456
CVE-2023-52458
CVE-2023-52463
CVE-2023-52464
CVE-2023-52467
CVE-2023-52469
CVE-2023-52470
CVE-2023-52609
CVE-2023-52610
CVE-2023-52612
CVE-2023-6356
CVE-2023-6536
CVE-2023-6915
CVE-2024-1085
CVE-2024-24860
CVE-2024-26586
CVE-2024-26589
CVE-2024-26591
CVE-2024-26597
CVE-2024-26598
CVE-2024-26631
CVE-2024-26633
CVE-2023-52429
CVE-2023-52435
CVE-2023-52486
CVE-2023-52489
CVE-2023-52491
CVE-2023-52492
CVE-2023-52493
CVE-2023-52494
CVE-2023-52498
CVE-2023-52583
CVE-2023-52587
CVE-2023-52588
CVE-2023-52594
CVE-2023-52595
CVE-2023-52597
CVE-2023-52598
CVE-2023-52599
CVE-2023-52600
CVE-2023-52601
CVE-2023-52602
CVE-2023-52603
CVE-2023-52604
CVE-2023-52606
CVE-2023-52607
CVE-2023-52608
CVE-2023-52614
CVE-2023-52615
CVE-2023-52616
CVE-2023-52617
CVE-2023-52618
CVE-2023-52619
CVE-2023-52622
CVE-2023-52623
CVE-2023-52627
CVE-2023-52631
CVE-2023-52633
CVE-2023-52635
CVE-2023-52637
CVE-2023-52638
CVE-2024-0340
CVE-2024-1086
CVE-2024-1151
CVE-2024-23849
CVE-2024-23850
CVE-2024-23851
CVE-2024-26592
CVE-2024-26593
CVE-2024-26594
CVE-2024-26600
CVE-2024-26602
CVE-2024-26606
CVE-2024-26608
CVE-2024-26610
CVE-2024-26614
CVE-2024-26615
CVE-2024-26625
CVE-2024-26627
CVE-2024-26635
CVE-2024-26636
CVE-2024-26640
CVE-2024-26641
CVE-2024-26644
CVE-2024-26645
CVE-2024-26660
CVE-2024-26663
CVE-2024-26664
CVE-2024-26665
CVE-2024-26668
CVE-2024-26671
CVE-2024-26673
CVE-2024-26675
CVE-2024-26676
CVE-2024-26679
CVE-2024-26684
CVE-2024-26685
CVE-2024-26689
CVE-2024-26696
CVE-2024-26697
CVE-2024-26698
CVE-2024-26702
CVE-2024-26704
CVE-2024-26707
CVE-2024-26712
CVE-2024-26715
CVE-2024-26717
CVE-2024-26720
CVE-2024-26727
CVE-2024-26808
CVE-2023-52434
CVE-2023-52497
CVE-2023-52640
CVE-2023-52641
CVE-2024-0565
CVE-2024-26601
CVE-2024-26603
CVE-2024-26733
CVE-2024-26735
CVE-2024-26736
CVE-2024-26737
CVE-2024-26743
CVE-2024-26744
CVE-2024-26747
CVE-2024-26748
CVE-2024-26749
CVE-2024-26751
CVE-2024-26752
CVE-2024-26754
CVE-2024-26763
CVE-2024-26764
CVE-2024-26766
CVE-2024-26769
CVE-2024-26771
CVE-2024-26772
CVE-2024-26773
CVE-2024-26774
CVE-2024-26776
CVE-2024-26777
CVE-2024-26778
CVE-2024-26779
CVE-2023-52620
CVE-2024-0841
CVE-2024-26622
CVE-2024-26688
CVE-2024-26782
CVE-2024-26788
CVE-2024-26790
CVE-2024-26791
CVE-2024-26793
CVE-2024-26795
CVE-2024-26798
CVE-2024-26801
CVE-2024-26802
CVE-2024-26803
CVE-2024-26804
CVE-2024-26805
CVE-2024-26659
CVE-2024-26787
CVE-2023-52447
CVE-2023-6270
CVE-2023-7042
CVE-2024-22099
CVE-2024-26651
CVE-2024-26809
CWE-ID CWE-400
CWE-787
CWE-20
CWE-200
CWE-416
CWE-476
CWE-617
CWE-125
CWE-667
CWE-362
CWE-401
CWE-119
CWE-366
CWE-754
CWE-399
CWE-254
CWE-129
CWE-665
CWE-121
CWE-193
CWE-908
CWE-824
CWE-682
CWE-190
CWE-388
CWE-415
CWE-369
CWE-825
CWE-191
CWE-835
CWE-284
CWE-252
CWE-404
Exploitation vector Network
Public exploit Vulnerability #77 is being exploited in the wild.
Vulnerable software
Subscribe
Slackware Linux
Operating systems & Components / Operating system

linux-5.15.160/kernel-modules
Operating systems & Components / Operating system package or component

linux-5.15.160/kernel-huge
Operating systems & Components / Operating system package or component

linux-5.15.160/kernel-generic
Operating systems & Components / Operating system package or component

linux-5.15.160/kernel-headers
Operating systems & Components / Operating system package or component

Vendor Slackware

Security Bulletin

This security bulletin contains information about 179 vulnerabilities.

1) Resource exhaustion

EUVDB-ID: #VU88378

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52340

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error when processing very large ICMPv6 packets. A remote attacker can send a flood of IPv6 ICMP6 PTB messages, cause the high lock contention and increased CPU usage, leading to a denial of service.

Successful vulnerability exploitation requires a attacker to be on the local network or have a high bandwidth connection.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds write

EUVDB-ID: #VU85840

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-6040

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the nf_tables_newtable() function in netfilter nf_tables. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Out-of-bounds write

EUVDB-ID: #VU86246

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-0646

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when processing untrusted input in the Linux kernel’s Transport Layer Security functionality in the way a user calls a function splice with a ktls socket as the destination. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

EUVDB-ID: #VU85682

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46838

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows an unprivileged guest to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of network packets at the backend. An unprivileged guest can send zero-length packets to the OS kernel and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Information disclosure

EUVDB-ID: #VU87592

Risk: Low

CVSSv3.1: 2.2 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52436

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to the __f2fs_setxattr() function in fs/f2fs/xattr.c, does not empty by default the unused space in the xattr list. A local user can gain access to potentially sensitive information.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU87593

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52438

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the binder_alloc_free_page() function in drivers/android/binder_alloc.c. A local user can trigger a race condition and escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use-after-free

EUVDB-ID: #VU87573

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52439

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the uio_open() function in drivers/uio/uio.c. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) NULL pointer dereference

EUVDB-ID: #VU89245

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52443

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the unpack_profile() function in security/apparmor/policy_unpack.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Reachable assertion

EUVDB-ID: #VU90918

Risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52444

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to reachable assertion within the f2fs_rename() function in fs/f2fs/namei.c. A local user can execute arbitrary code.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU87745

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52445

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in pvrusb2. A local user can execute arbitrary code with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) NULL pointer dereference

EUVDB-ID: #VU87741

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52448

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in gfs2_rgrp_dump() function. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) NULL pointer dereference

EUVDB-ID: #VU87742

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52449

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in mtd. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Out-of-bounds read

EUVDB-ID: #VU88891

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52451

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the dlpar_memory_remove_by_index() function in arch/powerpc/platforms/pseries/hotplug-memory.c. A local user can trigger an out-of-bounds read and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) NULL pointer dereference

EUVDB-ID: #VU89244

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52454

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the nvmet_tcp_build_pdu_iovec() function in drivers/nvme/target/tcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Improper locking

EUVDB-ID: #VU89243

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52456

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service attack (DoS) on the target system.

The vulnerability exists due to double-locking error within the imx_uart_stop_tx() function in drivers/tty/serial/imx.c. A local user can crash the OS kernel.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) NULL pointer dereference

EUVDB-ID: #VU90657

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52458

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the blkpg_do_ioctl() function in block/ioctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) NULL pointer dereference

EUVDB-ID: #VU90660

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52463

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the efivarfs_get_tree() function in fs/efivarfs/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Out-of-bounds write

EUVDB-ID: #VU88895

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52464

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the thunderx_ocx_com_threaded_isr() function in drivers/edac/thunderx_edac.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) NULL pointer dereference

EUVDB-ID: #VU89236

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52467

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the of_syscon_register() function in drivers/mfd/syscon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Use-after-free

EUVDB-ID: #VU89235

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52469

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the kv_parse_power_table() function in drivers/gpu/drm/amd/amdgpu/kv_dpm.c. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) NULL pointer dereference

EUVDB-ID: #VU92074

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52470

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the radeon_crtc_init() function in drivers/gpu/drm/radeon/radeon_display.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Race condition

EUVDB-ID: #VU91484

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52609

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the binder_update_page_range() function in drivers/android/binder_alloc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Memory leak

EUVDB-ID: #VU89382

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52610

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform DoS attack on the target system.

The vulnerability exists due memory leak in net/sched/act_ct.c. A local user can force the kernel to leak memory and perform denial of service attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Buffer overflow

EUVDB-ID: #VU91314

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52612

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the scomp_acomp_comp_decomp() function in crypto/scompress.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) NULL pointer dereference

EUVDB-ID: #VU85854

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-6356

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the nvmet_tcp_build_iovec() function in the Linux kernel's NVMe driver. A remote attacker can pass specially crafted TCP packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) NULL pointer dereference

EUVDB-ID: #VU85852

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-6536

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the __nvmet_req_complete() function in the Linux kernel's NVMe driver. A remote attacker can send specially crafted NVMe-oF/TCP packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) NULL pointer dereference

EUVDB-ID: #VU85423

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-6915

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the ida_free() function in lib/idr.c. A local user can pass specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Use-after-free

EUVDB-ID: #VU86578

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-1085

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the netfilter nf_tables component in Linux kernel. A local user can trigger a use-after-free error and execute arbitrary code on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Race condition

EUVDB-ID: #VU86580

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-24860

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within the {min,max}_key_size_set() function in the Linux kernel bluetooth device driver. A remote attacker with physical proximity to device can send specially crafted packets to the system and crash the kernel.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Out-of-bounds write

EUVDB-ID: #VU88935

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26586

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the mlxsw_sp_acl_tcam_init() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can trigger stack corruption and crash the kernel.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Buffer overflow

EUVDB-ID: #VU88886

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26589

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the adjust_ptr_min_max_vals() function in kernel/bpf/verifier.c. A local user can crash the OS kernel.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) NULL pointer dereference

EUVDB-ID: #VU88888

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26591

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the bpf_tracing_prog_attach() function in kernel/bpf/syscall.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Out-of-bounds read

EUVDB-ID: #VU87682

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26597

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in drivers/net/ethernet/qualcomm/rmnet/rmnet_config.c when parsing the netlink attributes. A local user can trigger an out-of-bounds read error and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Use-after-free

EUVDB-ID: #VU90262

Risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26598

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vgic_its_check_cache() and vgic_its_inject_cached_translation() functions in virt/kvm/arm/vgic/vgic-its.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Race condition within a thread

EUVDB-ID: #VU91436

Risk: Low

CVSSv3.1: 2.9 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26631

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to manipulate data.

The vulnerability exists due to a data race within the ipv6_mc_down() function in net/ipv6/mcast.c. A local user can manipulate data.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Input validation error

EUVDB-ID: #VU89267

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26633

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error in NEXTHDR_FRAGMENT handling within the ip6_tnl_parse_tlv_enc_lim() function in net/ipv6/ip6_tunnel.c. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Improper Check for Unusual or Exceptional Conditions

EUVDB-ID: #VU87166

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52429

CWE-ID: CWE-754 - Improper Check for Unusual or Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the dm_table_create() function in drivers/md/dm-table.c. A local user can pass specially crafted data to the kernel and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Buffer overflow

EUVDB-ID: #VU87748

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52435

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the skb_segment() function. A local user can trigger memory corruption and crash the kernel.


Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Improper locking

EUVDB-ID: #VU90801

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52486

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the drivers/gpu/drm/drm_plane.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Race condition

EUVDB-ID: #VU89388

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52489

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the section_deactivate() function in mm/sparse.c. A local user can exploit the race and escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Use-after-free

EUVDB-ID: #VU90228

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52491

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mtk_jpeg_dec_device_run() function in drivers/media/platform/mtk-jpeg/mtk_jpeg_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) NULL pointer dereference

EUVDB-ID: #VU90626

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52492

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() function in drivers/dma/dmaengine.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Improper locking

EUVDB-ID: #VU91537

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52493

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the parse_xfer_event() function in drivers/bus/mhi/host/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Buffer overflow

EUVDB-ID: #VU91209

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52494

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the mhi_del_ring_element() function in drivers/bus/mhi/host/main.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Improper locking

EUVDB-ID: #VU90800

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52498

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the dev_pm_skip_resume(), complete_all(), dpm_async_fn(), dpm_noirq_resume_devices(), dpm_resume_noirq(), pm_runtime_enable(), dpm_resume_early(), dpm_resume_start(), device_resume() and dpm_resume() functions in drivers/base/power/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Improper locking

EUVDB-ID: #VU90802

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52583

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ceph_encode_dentry_release() function in fs/ceph/caps.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Improper locking

EUVDB-ID: #VU91541

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52587

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ipoib_mcast_join() function in drivers/infiniband/ulp/ipoib/ipoib_multicast.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Resource management error

EUVDB-ID: #VU93647

Risk: Low

CVSSv3.1: 2.9 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52588

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to corrupt data.

The vulnerability exists due to improper management of internal resources within the __clone_blkaddrs() and redirty_blocks() functions in fs/f2fs/file.c, within the set_cluster_dirty() function in fs/f2fs/compress.c. A local user can corrupt data.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Out-of-bounds read

EUVDB-ID: #VU90343

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52594

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ath9k_htc_txstatus() function in drivers/net/wireless/ath/ath9k/htc_drv_txrx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Improper locking

EUVDB-ID: #VU90803

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52595

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rt2x00mac_bss_info_changed() function in drivers/net/wireless/ralink/rt2x00/rt2x00mac.c, within the rt2x00lib_disable_radio(), rt2x00lib_start() and rt2x00lib_stop() functions in drivers/net/wireless/ralink/rt2x00/rt2x00dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Security features bypass

EUVDB-ID: #VU92172

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52597

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a local privileged user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A local privileged can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Resource management error

EUVDB-ID: #VU93864

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52598

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources in arch/s390/kernel/ptrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Buffer overflow

EUVDB-ID: #VU88105

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52599

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the diNewExt() function in fs/jfs/jfs_imap.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Use-after-free

EUVDB-ID: #VU88104

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52600

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in fs/jfs/jfs_mount.c. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Buffer overflow

EUVDB-ID: #VU88103

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52601

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in fs/jfs/jfs_dmap.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Out-of-bounds read

EUVDB-ID: #VU89254

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52602

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the dtSearch() function in fs/jfs/jfs_dtree.c. A local user can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Improper validation of array index

EUVDB-ID: #VU88885

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52603

CWE-ID: CWE-129 - Improper Validation of Array Index

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper validation of array index within the dtSplitRoot() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Out-of-bounds read

EUVDB-ID: #VU90342

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52604

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dbAdjTree() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Buffer overflow

EUVDB-ID: #VU87343

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52606

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the fp/vmx code in powerpc/lib/sstep.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) NULL pointer dereference

EUVDB-ID: #VU90841

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52607

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pgtable_cache_add() function in arch/powerpc/mm/init-common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Resource management error

EUVDB-ID: #VU92973

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52608

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the shmem_poll_done() function in drivers/firmware/arm_scmi/shmem.c, within the rx_callback() function in drivers/firmware/arm_scmi/mailbox.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Buffer overflow

EUVDB-ID: #VU91315

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52614

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the trans_stat_show() function in drivers/devfreq/devfreq.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Improper locking

EUVDB-ID: #VU90798

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52615

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rng_get_data() and rng_dev_read() functions in drivers/char/hw_random/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) Improper Initialization

EUVDB-ID: #VU91556

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52616

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the mpi_ec_init() function in lib/mpi/ec.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Resource management error

EUVDB-ID: #VU93474

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52617

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the stdev_release(), stdev_create(), switchtec_init_pci() and switchtec_pci_remove() functions in drivers/pci/switch/switchtec.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Buffer overflow

EUVDB-ID: #VU93617

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52618

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the rnbd_srv_get_full_path() function in drivers/block/rnbd/rnbd-srv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Buffer overflow

EUVDB-ID: #VU93668

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52619

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the ramoops_init_przs() function in fs/pstore/ram.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Buffer overflow

EUVDB-ID: #VU93471

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52622

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the alloc_flex_gd() and ext4_setup_next_flex_gd() functions in fs/ext4/resize.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Improper locking

EUVDB-ID: #VU92046

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52623

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the xprt_iter_current_entry() and rpc_xprt_switch_has_addr() functions in net/sunrpc/xprtmultipath.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) NULL pointer dereference

EUVDB-ID: #VU90612

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52627

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the BIT() function in drivers/iio/adc/ad7091r5.c, within the BIT() and ad7091r_read_event_config() functions in drivers/iio/adc/ad7091r-base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) NULL pointer dereference

EUVDB-ID: #VU91240

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52631

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fs/ntfs3/ntfs_fs.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Resource management error

EUVDB-ID: #VU93282

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52633

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the time_travel_update_time(), time_travel_set_start() and timer_read() functions in arch/um/kernel/time.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Improper locking

EUVDB-ID: #VU92045

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52635

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the devfreq_monitor(), devfreq_monitor_start() and devfreq_monitor_stop() functions in drivers/devfreq/devfreq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Use-after-free

EUVDB-ID: #VU90218

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52637

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the j1939_sk_match_dst(), j1939_sk_match_filter(), j1939_sk_init() and j1939_sk_setsockopt() functions in net/can/j1939/socket.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Improper locking

EUVDB-ID: #VU90796

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52638

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the j1939_jsk_add(), j1939_sk_recv_match(), j1939_sk_recv(), j1939_sk_errqueue() and j1939_sk_netdev_event_netdown() functions in net/can/j1939/socket.c, within the j1939_netdev_start() function in net/can/j1939/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) Improper Initialization

EUVDB-ID: #VU86579

Risk: Low

CVSSv3.1: 3.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-0340

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper initialization within the vhost_new_msg() function in drivers/vhost/vhost.c in the Linux kernel vhost driver. A local user can run a specially crafted application to gain access to sensitive kernel information.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) Use-after-free

EUVDB-ID: #VU86577

Risk: High

CVSSv3.1: 8.4 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2024-1086

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the netfilter nf_tables component in Linux kernel. A local user can trigger a use-after-free error and execute arbitrary code on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

78) Stack-based buffer overflow

EUVDB-ID: #VU87165

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-1151

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the Open vSwitch sub-component in the Linux Kernel. A remote unauthenticated attacker can send specially crafted packets to the system. trigger a stack-based buffer overflow and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) Off-by-one

EUVDB-ID: #VU86019

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-23849

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an off-by-one error within the rds_recv_track_latency() function in net/rds/af_rds.c. A local user can trigger an off-by-one error and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) Reachable Assertion

EUVDB-ID: #VU87594

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-23850

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the btrfs_get_root_ref() function in fs/btrfs/disk-io.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) Out-of-bounds read

EUVDB-ID: #VU87595

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-23851

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the copy_params() function in drivers/md/dm-ioctl.c. A remote attacker can trigger an out-of-bounds read and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Use-after-free

EUVDB-ID: #VU86812

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26592

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a race condition when handling TCP connect and disconnect events within the ksmbd_tcp_new_connection() function in ksmbd. A remote non-authenticated attacker can trigger a use-after-free error and crash the kernel or execute arbitrary code on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) Out-of-bounds read

EUVDB-ID: #VU89250

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26593

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the i801_block_transaction_by_block() function in drivers/i2c/busses/i2c-i801.c. A local user can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) Out-of-bounds read

EUVDB-ID: #VU86813

Risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26594

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when handling SMB2 Mech Tokens. A remote attacker can send specially crafted packets to ksmbd, trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) NULL pointer dereference

EUVDB-ID: #VU89249

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26600

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in drivers/phy/ti/phy-omap-usb2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Resource exhaustion

EUVDB-ID: #VU87499

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26602

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper resource management in kernel/sched/membarrier.c. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Resource management error

EUVDB-ID: #VU89247

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26606

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the binder_enqueue_thread_work_ilocked() function in drivers/android/binder.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) Out-of-bounds read

EUVDB-ID: #VU90341

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26608

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the handle_unsupported_event() and handle_generic_event() functions in fs/ksmbd/transport_ipc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Buffer overflow

EUVDB-ID: #VU89679

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26610

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the iwl_dbg_tlv_override_trig_node() function in drivers/net/wireless/intel/iwlwifi/iwl-dbg-tlv.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) Resource management error

EUVDB-ID: #VU91320

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26614

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the reqsk_queue_alloc() function in net/core/request_sock.c. A remote attacker can send specially crafted ACK packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) NULL pointer dereference

EUVDB-ID: #VU90627

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26615

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __smc_diag_dump() function in net/smc/smc_diag.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Use-after-free

EUVDB-ID: #VU87344

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26625

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error in net/llc/af_llc.c when handling orphan sockets. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Improper locking

EUVDB-ID: #VU88101

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26627

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service attack (DoS).

The vulnerability exists due to improper locking when calling the scsi_host_busy() function. A local user can perform a denial of service attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Use of uninitialized resource

EUVDB-ID: #VU90880

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26635

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the cpu_to_be16() function in net/llc/llc_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Input validation error

EUVDB-ID: #VU90859

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26636

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the llc_ui_sendmsg() function in net/llc/af_llc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) Resource management error

EUVDB-ID: #VU89397

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26640

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the skb_advance_to_frag() function in net/ipv4/tcp.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) Access of Uninitialized Pointer

EUVDB-ID: #VU89396

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26641

CWE-ID: CWE-824 - Access of Uninitialized Pointer

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to access to uninitialized data within the __ip6_tnl_rcv() function in net/ipv6/ip6_tunnel.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) Improper locking

EUVDB-ID: #VU91535

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26644

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the create_snapshot() function in fs/btrfs/ioctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) Incorrect calculation

EUVDB-ID: #VU93762

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26645

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the __tracing_map_insert() function in kernel/trace/tracing_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) Out-of-bounds read

EUVDB-ID: #VU90334

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26660

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dcn301_stream_encoder_create() function in drivers/gpu/drm/amd/display/dc/dcn301/dcn301_resource.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) NULL pointer dereference

EUVDB-ID: #VU92073

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26663

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tipc_nl_bearer_add() function in net/tipc/bearer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) Out-of-bounds read

EUVDB-ID: #VU90335

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26664

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the create_core_data() function in drivers/hwmon/coretemp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) Out-of-bounds read

EUVDB-ID: #VU90336

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26665

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the iptunnel_pmtud_build_icmpv6() function in net/ipv4/ip_tunnel_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) Integer overflow

EUVDB-ID: #VU91180

Risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26668

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the nft_limit_eval() and nft_limit_init() functions in net/netfilter/nft_limit.c. A local user can execute arbitrary code.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Buffer overflow

EUVDB-ID: #VU92977

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26671

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the blk_mq_mark_tag_wait() function in block/blk-mq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) Input validation error

EUVDB-ID: #VU94118

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26673

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the nft_ct_expect_obj_init() function in net/netfilter/nft_ct.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) Input validation error

EUVDB-ID: #VU90858

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26675

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ppp_async_ioctl() function in drivers/net/ppp/ppp_async.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

108) Out-of-bounds read

EUVDB-ID: #VU90337

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26676

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the unix_gc() function in net/unix/garbage.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) Improper locking

EUVDB-ID: #VU92044

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26679

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the EXPORT_SYMBOL() function in net/ipv4/af_inet.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

110) Improper error handling

EUVDB-ID: #VU90952

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26684

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the dwxgmac3_handle_dma_err(), dwxgmac3_safety_feat_config(), dwxgmac3_safety_feat_irq_status() and dwxgmac3_safety_feat_dump() functions in drivers/net/ethernet/stmicro/stmmac/dwxgmac2_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) Race condition

EUVDB-ID: #VU91481

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26685

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the nilfs_segctor_prepare_write(), nilfs_abort_logs() and nilfs_segctor_complete_write() functions in fs/nilfs2/segment.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) Use-after-free

EUVDB-ID: #VU90220

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26689

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __prep_cap() and __send_cap() functions in fs/ceph/caps.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

113) Improper locking

EUVDB-ID: #VU90795

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26696

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nilfs_page_mkwrite() function in fs/nilfs2/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) Information disclosure

EUVDB-ID: #VU91365

Risk: Low

CVSSv3.1: 2.9 [AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26697

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the nilfs_prepare_segment_for_recovery(), nilfs_recovery_copy_block() and nilfs_recover_dsync_blocks() functions in fs/nilfs2/recovery.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) Race condition

EUVDB-ID: #VU91482

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26698

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the netvsc_device_remove() function in drivers/net/hyperv/netvsc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) Out-of-bounds read

EUVDB-ID: #VU91100

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26702

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the rm3100_common_probe() function in drivers/iio/magnetometer/rm3100-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) Double free

EUVDB-ID: #VU90929

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26704

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the ext4_move_extents() function in fs/ext4/move_extent.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) Resource management error

EUVDB-ID: #VU93206

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26707

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the send_hsr_supervision_frame() and send_prp_supervision_frame() functions in net/hsr/hsr_device.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) Buffer overflow

EUVDB-ID: #VU93400

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26712

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the kasan_init_region() function in arch/powerpc/mm/kasan/kasan_init_32.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

120) NULL pointer dereference

EUVDB-ID: #VU90608

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26715

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dwc3_gadget_suspend() function in drivers/usb/dwc3/gadget.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

121) NULL pointer dereference

EUVDB-ID: #VU93058

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26717

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the i2c_hid_of_probe() function in drivers/hid/i2c-hid/i2c-hid-of.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

122) Division by zero

EUVDB-ID: #VU91379

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26720

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the wb_dirty_limits() function in mm/page-writeback.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

123) Reachable assertion

EUVDB-ID: #VU90911

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26727

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the btrfs_get_root_ref() function in fs/btrfs/disk-io.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

124) Expired pointer dereference

EUVDB-ID: #VU93809

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26808

CWE-ID: CWE-825 - Expired pointer dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a stale reference within the nf_tables_netdev_event() function in net/netfilter/nft_chain_filter.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

125) Buffer overflow

EUVDB-ID: #VU88283

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52434

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the smb2_parse_contexts() function when parsing SMB packets. A remote user can send specially crafted SMB traffic to the affected system, trigger memory corruption and execute arbitrary code.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

126) Resource exhaustion

EUVDB-ID: #VU93097

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52497

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack and modify data on the system,.

The vulnerability exists due to application does not properly control consumption of internal resources. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack and modify data on the system,.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

127) Out-of-bounds read

EUVDB-ID: #VU90331

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52640

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ntfs_list_ea() function in fs/ntfs3/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

128) NULL pointer dereference

EUVDB-ID: #VU90592

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52641

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ni_find_attr() and run_truncate_around() functions in fs/ntfs3/attrib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

129) Integer underflow

EUVDB-ID: #VU86552

Risk: High

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-0565

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer underflow within the receive_encrypted_standard() function in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. A remote attacker can trick the victim to connect to a malicious SMB server, trigger an integer underflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

130) Improper locking

EUVDB-ID: #VU93770

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26601

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ext4_mb_generate_buddy() and mb_free_blocks() functions in fs/ext4/mballoc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

131) Infinite loop

EUVDB-ID: #VU89248

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26603

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in arch/x86/kernel/fpu/signal.c. A local user can consume all available system resources and cause denial of service conditions.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

132) Buffer overflow

EUVDB-ID: #VU92952

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26733

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the arp_req_get() function in net/ipv4/arp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

133) Use-after-free

EUVDB-ID: #VU90215

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26735

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the seg6_init() function in net/ipv6/seg6.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

134) Buffer overflow

EUVDB-ID: #VU92007

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26736

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the afs_update_volume_status() function in fs/afs/volume.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

135) Race condition

EUVDB-ID: #VU88938

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26737

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition between the bpf_timer_cancel_and_free and bpf_timer_cancel calls in kernel/bpf/helpers.c. A local user can exploit the race and escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

136) Improper locking

EUVDB-ID: #VU92042

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26743

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the qedr_create_user_qp() function in drivers/infiniband/hw/qedr/verbs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

137) NULL pointer dereference

EUVDB-ID: #VU90596

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26744

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the module_param() function in drivers/infiniband/ulp/srpt/ib_srpt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

138) NULL pointer dereference

EUVDB-ID: #VU90598

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26747

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the usb_role_switch_get(), fwnode_usb_role_switch_get(), EXPORT_SYMBOL_GPL(), usb_role_switch_find_by_fwnode() and usb_role_switch_register() functions in drivers/usb/roles/class.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

139) Use-after-free

EUVDB-ID: #VU90213

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26748

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cdns3_gadget_giveback() function in drivers/usb/cdns3/gadget.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

140) Use-after-free

EUVDB-ID: #VU90216

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26749

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cdns3_gadget_ep_disable() function in drivers/usb/cdns3/gadget.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

141) Infinite loop

EUVDB-ID: #VU93671

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26751

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the GPIO_LOOKUP_IDX() function in arch/arm/mach-ep93xx/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

142) Incorrect calculation

EUVDB-ID: #VU89392

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26752

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the l2tp_ip6_sendmsg() function in net/l2tp/l2tp_ip6.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

143) Use-after-free

EUVDB-ID: #VU90217

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26754

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the gtp_init() function in drivers/net/gtp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

144) Resource management error

EUVDB-ID: #VU93859

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26763

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources during authentication within the kcryptd_crypt_write_convert() function in drivers/md/dm-crypt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

145) Resource management error

EUVDB-ID: #VU93844

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26764

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the kiocb_set_cancel_fn() and aio_prep_rw() functions in fs/aio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

146) Off-by-one

EUVDB-ID: #VU89678

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26766

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an off-by-one error within the _pad_sdma_tx_descs() function in drivers/infiniband/hw/hfi1/sdma.c. A local user can trigger an off-by-one error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

147) Improper locking

EUVDB-ID: #VU90787

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26769

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nvmet_fc_tgt_a_get(), __nvmet_fc_finish_ls_req() and nvmet_fc_register_targetport() functions in drivers/nvme/target/fc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

148) NULL pointer dereference

EUVDB-ID: #VU90602

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26771

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the edma_probe() function in drivers/dma/ti/edma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

149) Improper locking

EUVDB-ID: #VU92041

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26772

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ext4_mb_find_by_goal() function in fs/ext4/mballoc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

150) Improper locking

EUVDB-ID: #VU93787

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26773

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ext4_mb_try_best_found() function in fs/ext4/mballoc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

151) Division by zero

EUVDB-ID: #VU93751

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26774

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the mb_update_avg_fragment_size() function in fs/ext4/mballoc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

152) NULL pointer dereference

EUVDB-ID: #VU90601

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26776

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hisi_sfc_v3xx_isr() function in drivers/spi/spi-hisi-sfc-v3xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

153) Division by zero

EUVDB-ID: #VU91377

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26777

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the sisfb_check_var() function in drivers/video/fbdev/sis/sis_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

154) Division by zero

EUVDB-ID: #VU91378

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26778

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the savagefb_check_var() function in drivers/video/fbdev/savage/savagefb_driver.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

155) Race condition

EUVDB-ID: #VU91480

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26779

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the ieee80211_check_fast_xmit() function in net/mac80211/tx.c, within the sta_info_insert_finish() function in net/mac80211/sta_info.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

156) Improper access control

EUVDB-ID: #VU89268

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52620

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions within the nf_tables_newset() function in net/netfilter/nf_tables_api.c when setting timeouts from userspace. A local user can bypass implemented security restrictions and perform a denial of service attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

157) NULL pointer dereference

EUVDB-ID: #VU89389

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-0841

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the hugetlbfs_fill_super() function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

158) Use-after-free

EUVDB-ID: #VU87193

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26622

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tomoyo_write_control() function. A local  user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

159) NULL pointer dereference

EUVDB-ID: #VU90603

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26688

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hugetlbfs_parse_param() function in fs/hugetlbfs/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

160) Double free

EUVDB-ID: #VU90927

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26782

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the mptcp_inet6_sk() and mptcp_sk_clone() functions in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

161) Resource management error

EUVDB-ID: #VU92972

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26788

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the fsl_qdma_probe() function in drivers/dma/fsl-qdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

162) Improper locking

EUVDB-ID: #VU90784

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26790

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the FSL_QDMA_CMD_PF BIT() and fsl_qdma_comp_fill_memcpy() functions in drivers/dma/fsl-qdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

163) Out-of-bounds read

EUVDB-ID: #VU91098

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26791

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the btrfs_check_replace_dev_names() and btrfs_dev_replace_by_ioctl() functions in fs/btrfs/dev-replace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

164) Use-after-free

EUVDB-ID: #VU90211

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26793

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the gtp_init() function in drivers/net/gtp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

165) Out-of-bounds read

EUVDB-ID: #VU90329

Risk: Low

CVSSv3.1: 3.2 [AV:L/AC:L/PR:L/UI:U/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26795

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the arch/riscv/include/asm/pgtable.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

166) Resource management error

EUVDB-ID: #VU92989

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26798

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the fbcon_do_set_font() function in drivers/video/fbdev/core/fbcon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

167) Use-after-free

EUVDB-ID: #VU90209

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26801

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hci_error_reset() function in net/bluetooth/hci_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

168) NULL pointer dereference

EUVDB-ID: #VU90589

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26802

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the stmmac_fpe_stop_wq() function in drivers/net/ethernet/stmicro/stmmac/stmmac_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

169) Improper Initialization

EUVDB-ID: #VU91553

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26803

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the veth_enable_xdp(), veth_disable_xdp() and veth_xdp_set() functions in drivers/net/veth.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

170) Use-after-free

EUVDB-ID: #VU90212

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26804

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tnl_update_pmtu(), ip_md_tunnel_xmit() and ip_tunnel_xmit() functions in net/ipv4/ip_tunnel.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

171) Use of uninitialized resource

EUVDB-ID: #VU90879

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26805

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the netlink_group_mask() function in net/netlink/af_netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

172) Buffer overflow

EUVDB-ID: #VU93244

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26659

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the process_isoc_td() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

173) Information disclosure

EUVDB-ID: #VU89239

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26787

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output within the sdmmc_idma_start() function in drivers/mmc/host/mmci_stm32_sdmmc.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

174) Use-after-free

EUVDB-ID: #VU87740

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52447

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in bpf. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

175) Use-after-free

EUVDB-ID: #VU91599

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-6270

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the aoecmd_cfg_pkts() function in the ATA over Ethernet (AoE) driver. A local user can trigger a use-after-free error and escalate privileges on the system.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

176) NULL pointer dereference

EUVDB-ID: #VU85422

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-7042

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() function in drivers/net/wireless/ath/ath10k/wmi-tlv.c. A local user can pass specially crafted data to the driver and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

177) NULL pointer dereference

EUVDB-ID: #VU87192

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-22099

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the rfcomm_check_security() function in /net/bluetooth/rfcomm/core.c. A local user can pass specially crafted data to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

178) Unchecked Return Value

EUVDB-ID: #VU87902

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26651

CWE-ID: CWE-252 - Unchecked Return Value

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a missing check of the return value from the usbnet_get_endpoints() function in drivers/net/usb/sr9800.c. A local user can crash the kernel.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

179) Improper resource shutdown or release

EUVDB-ID: #VU93747

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26809

CWE-ID: CWE-404 - Improper Resource Shutdown or Release

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to failure to properly release resources within the nft_pipapo_destroy() function in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package kernel.

Vulnerable software versions

Slackware Linux: 15.0

linux-5.15.160/kernel-modules: before 5.15.160

linux-5.15.160/kernel-huge: before 5.15.160

linux-5.15.160/kernel-generic: before 5.15.160

linux-5.15.160/kernel-headers: before 5.15.160_smp

CPE2.3 External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.1327811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###