VYPR

rpm package

opensuse/kernel-obs-build&distro=openSUSE Leap 15.5

pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.5

Vulnerabilities (1,895)

  • CVE-2022-48940Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: Fix crash due to incorrect copy_map_value When both bpf_spin_lock and bpf_timer are present in a BPF map value, copy_map_value needs to skirt both objects when copying a value into and out of the map. Howe

  • CVE-2022-48939Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: Add schedule points in batch ops syzbot reported various soft lockups caused by bpf batch operations. INFO: task kworker/1:1:27 blocked for more than 140 seconds. INFO: task hung in rcu_barrier Nothing

  • CVE-2022-48938Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: CDC-NCM: avoid overflow in sanity checking A broken device may give an extreme offset like 0xFFF0 and a reasonable length for a fragment. In the sanity check as formulated now, this will create an integer overf

  • CVE-2022-48937Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: io_uring: add a schedule point in io_add_buffers() Looping ~65535 times doing kmalloc() calls can trigger soft lockups, especially with DEBUG features (like KASAN). [ 253.536212] watchdog: BUG: soft lockup -

  • CVE-2022-48934Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() ida_simple_get() returns an id between min (0) and max (NFP_MAX_MAC_INDEX) inclusive. So NFP_MAX_MAC_INDEX (0xff) is a valid id. In order for th

  • CVE-2022-48932Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte When adding a rule with 32 destinations, we hit the following out-of-band access issue: BUG: KASAN: slab-out-of-bounds in mlx5_cmd_dr_create_fte

  • CVE-2022-48931Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: configfs: fix a race in configfs_{,un}register_subsystem() When configfs_register_subsystem() or configfs_unregister_subsystem() is executing link_group() or unlink_group(), it is possible that two processes ad

  • CVE-2022-48930Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/ib_srp: Fix a deadlock Remove the flush_workqueue(system_long_wq) call since flushing system_long_wq is deadlock-prone and since that call is redundant with a preceding cancel_work_sync()

  • CVE-2022-48929Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: Fix crash due to out of bounds access into reg2btf_ids. When commit e6ac2450d6de ("bpf: Support bpf program calling kernel function") added kfunc support, it defined reg2btf_ids as a cheap way to translate

  • CVE-2022-48928Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: iio: adc: men_z188_adc: Fix a resource leak in an error handling path If iio_device_register() fails, a previous ioremap() is left unbalanced. Update the error handling path and add the missing iounmap() call,

  • CVE-2022-48927Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: iio: adc: tsc2046: fix memory corruption by preventing array overflow On one side we have indio_dev->num_channels includes all physical channels + timestamp channel. On other side we have an array allocated onl

  • CVE-2022-48926Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: usb: gadget: rndis: add spinlock for rndis response list There's no lock for rndis response list. It could cause list corruption if there're two different list_add at the same time like below. It's better to ad

  • CVE-2022-48943Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: make apf token non-zero to fix bug In current async pagefault logic, when a page is ready, KVM relies on kvm_arch_can_dequeue_async_page_present() to determine whether to deliver a READY event to

  • CVE-2022-48942Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: hwmon: Handle failure to register sensor with thermal zone correctly If an attempt is made to a sensor with a thermal zone and it fails, the call to devm_thermal_zone_of_sensor_register() may return -ENODEV. Th

  • CVE-2022-48925Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Do not change route.addr.src_addr outside state checks If the state is not idle then resolve_prepare_src() should immediately fail and no change to global state should happen. However, it unconditiona

  • CVE-2022-48924Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: thermal: int340x: fix memory leak in int3400_notify() It is easy to hit the below memory leaks in my TigerLake platform: unreferenced object 0xffff927c8b91dbc0 (size 32): comm "kworker/0:2", pid 112, jiffies

  • CVE-2022-48923Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: prevent copying too big compressed lzo segment Compressed length can be corrupted to be a lot larger than memory we have allocated for buffer. This will cause memcpy in copy_compressed_segment to write o

  • CVE-2022-48921Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix fault in reweight_entity Syzbot found a GPF in reweight_entity. This has been bisected to commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an invalid sched_task_group") There is a ra

  • CVE-2022-48920Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: get rid of warning on transaction commit when using flushoncommit When using the flushoncommit mount option, during almost every transaction commit we trigger a warning from __writeback_inodes_sb_nr():

  • CVE-2022-48919Aug 22, 2024
    affected < 5.14.21-150500.55.80.1fixed 5.14.21-150500.55.80.1

    In the Linux kernel, the following vulnerability has been resolved: cifs: fix double free race when mount fails in cifs_get_root() When cifs_get_root() fails during cifs_smb3_do_mount() we call deactivate_locked_super() which eventually will call delayed_free() which will free

Page 2 of 95