rpm package
opensuse/kernel-rt&distro=openSUSE Leap Micro 5.3
pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%20Micro%205.3
Vulnerabilities (676)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-48692 | — | < 5.14.21-150400.15.82.1 | 5.14.21-150400.15.82.1 | May 3, 2024 | In the Linux kernel, the following vulnerability has been resolved: RDMA/srp: Set scmnd->result only when scmnd is not NULL This change fixes the following kernel NULL pointer dereference which is reproduced by blktests srp/007 occasionally. BUG: kernel NULL pointer dereferenc | ||
| CVE-2022-48688 | — | < 5.14.21-150400.15.82.1 | 5.14.21-150400.15.82.1 | May 3, 2024 | In the Linux kernel, the following vulnerability has been resolved: i40e: Fix kernel crash during module removal The driver incorrectly frees client instance and subsequent i40e module removal leads to kernel crash. Reproducer: 1. Do ethtool offline test followed immediately b | ||
| CVE-2022-48687 | — | < 5.14.21-150400.15.82.1 | 5.14.21-150400.15.82.1 | May 3, 2024 | In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix out-of-bounds read when setting HMAC data. The SRv6 layer allows defining HMAC data that can later be used to sign IPv6 Segment Routing Headers. This configuration is realised via netlink through | ||
| CVE-2022-48686 | — | < 5.14.21-150400.15.82.1 | 5.14.21-150400.15.82.1 | May 3, 2024 | In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix UAF when detecting digest errors We should also bail from the io_work loop when we set rd_enabled to true, so we don't attempt to read data from the socket when the TCP stream is already out-of-sy | ||
| CVE-2022-48675 | — | < 5.14.21-150400.15.82.1 | 5.14.21-150400.15.82.1 | May 3, 2024 | In the Linux kernel, the following vulnerability has been resolved: IB/core: Fix a nested dead lock as part of ODP flow Fix a nested dead lock as part of ODP flow by using mmput_async(). From the below call trace [1] can see that calling mmput() once we have the umem_odp->umem | ||
| CVE-2022-48673 | — | < 5.14.21-150400.15.82.1 | 5.14.21-150400.15.82.1 | May 3, 2024 | In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix possible access to freed memory in link clear After modifying the QP to the Error state, all RX WR would be completed with WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not wait for | ||
| CVE-2022-48672 | — | < 5.14.21-150400.15.82.1 | 5.14.21-150400.15.82.1 | May 3, 2024 | In the Linux kernel, the following vulnerability has been resolved: of: fdt: fix off-by-one error in unflatten_dt_nodes() Commit 78c44d910d3e ("drivers/of: Fix depth when unflattening devicetree") forgot to fix up the depth check in the loop body in unflatten_dt_nodes() which m | ||
| CVE-2022-48671 | — | < 5.14.21-150400.15.82.1 | 5.14.21-150400.15.82.1 | May 3, 2024 | In the Linux kernel, the following vulnerability has been resolved: cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() syzbot is hitting percpu_rwsem_assert_held(&cpu_hotplug_lock) warning at cpuset_attach() [1], for commit 4f7e7236435ca0ab ("cgroup: Fix threadgro | ||
| CVE-2024-27389 | — | < 5.14.21-150400.15.79.1 | 5.14.21-150400.15.79.1 | May 1, 2024 | In the Linux kernel, the following vulnerability has been resolved: pstore: inode: Only d_invalidate() is needed Unloading a modular pstore backend with records in pstorefs would trigger the dput() double-drop warning: WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0 | ||
| CVE-2024-27043 | — | < 5.14.21-150400.15.79.1 | 5.14.21-150400.15.79.1 | May 1, 2024 | In the Linux kernel, the following vulnerability has been resolved: media: edia: dvbdev: fix a use-after-free In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed in several error-handling paths. However, *pdvbdev is not set to NULL after dvbdev's deallocatio | ||
| CVE-2024-26930 | — | < 5.14.21-150400.15.82.1 | 5.14.21-150400.15.82.1 | May 1, 2024 | In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix double free of the ha->vp_map pointer Coverity scan reported potential risk of double free of the pointer ha->vp_map. ha->vp_map was freed in qla2x00_mem_alloc(), and again freed in function | ||
| CVE-2022-48668 | — | < 5.14.21-150400.15.79.1 | 5.14.21-150400.15.79.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: smb3: fix temporary data corruption in collapse range collapse range doesn't discard the affected cached region so can risk temporarily corrupting the file data. This fixes xfstest generic/031 I also decided t | ||
| CVE-2022-48667 | — | < 5.14.21-150400.15.79.1 | 5.14.21-150400.15.79.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: smb3: fix temporary data corruption in insert range insert range doesn't discard the affected cached region so can risk temporarily corrupting file data. Also includes some minor cleanup (avoiding rereading in | ||
| CVE-2022-48663 | — | < 5.14.21-150400.15.79.1 | 5.14.21-150400.15.79.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: gpio: mockup: fix NULL pointer dereference when removing debugfs We now remove the device's debugfs entries when unbinding the driver. This now causes a NULL-pointer dereference on module exit because the platf | ||
| CVE-2022-48662 | — | < 5.14.21-150400.15.79.1 | 5.14.21-150400.15.79.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires tha | ||
| CVE-2022-48660 | — | < 5.14.21-150400.15.79.1 | 5.14.21-150400.15.79.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully When running gpio test on nxp-ls1028 platform with below command gpiomon --num-events=3 --rising-edge gpiochip1 25 There will be a warning | ||
| CVE-2022-48657 | — | < 5.14.21-150400.15.79.1 | 5.14.21-150400.15.79.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: arm64: topology: fix possible overflow in amu_fie_setup() cpufreq_get_hw_max_freq() returns max frequency in kHz as *unsigned int*, while freq_inv_set_max_ratio() gets passed this frequency in Hz as 'u64'. Mult | ||
| CVE-2022-48656 | — | < 5.14.21-150400.15.79.1 | 5.14.21-150400.15.79.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() We should call of_node_put() for the reference returned by of_parse_phandle() in fail path or when it is not used anymore. Here we onl | ||
| CVE-2022-48655 | — | < 5.14.21-150400.15.79.1 | 5.14.21-150400.15.79.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Harden accesses to the reset domains Accessing reset domains descriptors by the index upon the SCMI drivers requests through the SCMI reset operations interface can potentially lead to out-o | ||
| CVE-2022-48654 | — | < 5.14.21-150400.15.79.1 | 5.14.21-150400.15.79.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find() nf_osf_find() incorrectly returns true on mismatch, this leads to copying uninitialized memory area in nft_osf which can be used to leak stale |
- CVE-2022-48692May 3, 2024affected < 5.14.21-150400.15.82.1fixed 5.14.21-150400.15.82.1
In the Linux kernel, the following vulnerability has been resolved: RDMA/srp: Set scmnd->result only when scmnd is not NULL This change fixes the following kernel NULL pointer dereference which is reproduced by blktests srp/007 occasionally. BUG: kernel NULL pointer dereferenc
- CVE-2022-48688May 3, 2024affected < 5.14.21-150400.15.82.1fixed 5.14.21-150400.15.82.1
In the Linux kernel, the following vulnerability has been resolved: i40e: Fix kernel crash during module removal The driver incorrectly frees client instance and subsequent i40e module removal leads to kernel crash. Reproducer: 1. Do ethtool offline test followed immediately b
- CVE-2022-48687May 3, 2024affected < 5.14.21-150400.15.82.1fixed 5.14.21-150400.15.82.1
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix out-of-bounds read when setting HMAC data. The SRv6 layer allows defining HMAC data that can later be used to sign IPv6 Segment Routing Headers. This configuration is realised via netlink through
- CVE-2022-48686May 3, 2024affected < 5.14.21-150400.15.82.1fixed 5.14.21-150400.15.82.1
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix UAF when detecting digest errors We should also bail from the io_work loop when we set rd_enabled to true, so we don't attempt to read data from the socket when the TCP stream is already out-of-sy
- CVE-2022-48675May 3, 2024affected < 5.14.21-150400.15.82.1fixed 5.14.21-150400.15.82.1
In the Linux kernel, the following vulnerability has been resolved: IB/core: Fix a nested dead lock as part of ODP flow Fix a nested dead lock as part of ODP flow by using mmput_async(). From the below call trace [1] can see that calling mmput() once we have the umem_odp->umem
- CVE-2022-48673May 3, 2024affected < 5.14.21-150400.15.82.1fixed 5.14.21-150400.15.82.1
In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix possible access to freed memory in link clear After modifying the QP to the Error state, all RX WR would be completed with WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not wait for
- CVE-2022-48672May 3, 2024affected < 5.14.21-150400.15.82.1fixed 5.14.21-150400.15.82.1
In the Linux kernel, the following vulnerability has been resolved: of: fdt: fix off-by-one error in unflatten_dt_nodes() Commit 78c44d910d3e ("drivers/of: Fix depth when unflattening devicetree") forgot to fix up the depth check in the loop body in unflatten_dt_nodes() which m
- CVE-2022-48671May 3, 2024affected < 5.14.21-150400.15.82.1fixed 5.14.21-150400.15.82.1
In the Linux kernel, the following vulnerability has been resolved: cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() syzbot is hitting percpu_rwsem_assert_held(&cpu_hotplug_lock) warning at cpuset_attach() [1], for commit 4f7e7236435ca0ab ("cgroup: Fix threadgro
- CVE-2024-27389May 1, 2024affected < 5.14.21-150400.15.79.1fixed 5.14.21-150400.15.79.1
In the Linux kernel, the following vulnerability has been resolved: pstore: inode: Only d_invalidate() is needed Unloading a modular pstore backend with records in pstorefs would trigger the dput() double-drop warning: WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0
- CVE-2024-27043May 1, 2024affected < 5.14.21-150400.15.79.1fixed 5.14.21-150400.15.79.1
In the Linux kernel, the following vulnerability has been resolved: media: edia: dvbdev: fix a use-after-free In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed in several error-handling paths. However, *pdvbdev is not set to NULL after dvbdev's deallocatio
- CVE-2024-26930May 1, 2024affected < 5.14.21-150400.15.82.1fixed 5.14.21-150400.15.82.1
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix double free of the ha->vp_map pointer Coverity scan reported potential risk of double free of the pointer ha->vp_map. ha->vp_map was freed in qla2x00_mem_alloc(), and again freed in function
- CVE-2022-48668Apr 28, 2024affected < 5.14.21-150400.15.79.1fixed 5.14.21-150400.15.79.1
In the Linux kernel, the following vulnerability has been resolved: smb3: fix temporary data corruption in collapse range collapse range doesn't discard the affected cached region so can risk temporarily corrupting the file data. This fixes xfstest generic/031 I also decided t
- CVE-2022-48667Apr 28, 2024affected < 5.14.21-150400.15.79.1fixed 5.14.21-150400.15.79.1
In the Linux kernel, the following vulnerability has been resolved: smb3: fix temporary data corruption in insert range insert range doesn't discard the affected cached region so can risk temporarily corrupting file data. Also includes some minor cleanup (avoiding rereading in
- CVE-2022-48663Apr 28, 2024affected < 5.14.21-150400.15.79.1fixed 5.14.21-150400.15.79.1
In the Linux kernel, the following vulnerability has been resolved: gpio: mockup: fix NULL pointer dereference when removing debugfs We now remove the device's debugfs entries when unbinding the driver. This now causes a NULL-pointer dereference on module exit because the platf
- CVE-2022-48662Apr 28, 2024affected < 5.14.21-150400.15.79.1fixed 5.14.21-150400.15.79.1
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires tha
- CVE-2022-48660Apr 28, 2024affected < 5.14.21-150400.15.79.1fixed 5.14.21-150400.15.79.1
In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully When running gpio test on nxp-ls1028 platform with below command gpiomon --num-events=3 --rising-edge gpiochip1 25 There will be a warning
- CVE-2022-48657Apr 28, 2024affected < 5.14.21-150400.15.79.1fixed 5.14.21-150400.15.79.1
In the Linux kernel, the following vulnerability has been resolved: arm64: topology: fix possible overflow in amu_fie_setup() cpufreq_get_hw_max_freq() returns max frequency in kHz as *unsigned int*, while freq_inv_set_max_ratio() gets passed this frequency in Hz as 'u64'. Mult
- CVE-2022-48656Apr 28, 2024affected < 5.14.21-150400.15.79.1fixed 5.14.21-150400.15.79.1
In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() We should call of_node_put() for the reference returned by of_parse_phandle() in fail path or when it is not used anymore. Here we onl
- CVE-2022-48655Apr 28, 2024affected < 5.14.21-150400.15.79.1fixed 5.14.21-150400.15.79.1
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Harden accesses to the reset domains Accessing reset domains descriptors by the index upon the SCMI drivers requests through the SCMI reset operations interface can potentially lead to out-o
- CVE-2022-48654Apr 28, 2024affected < 5.14.21-150400.15.79.1fixed 5.14.21-150400.15.79.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find() nf_osf_find() incorrectly returns true on mismatch, this leads to copying uninitialized memory area in nft_osf which can be used to leak stale
Page 15 of 34