rpm package
opensuse/kernel-syms-rt&distro=openSUSE Leap 15.5
pkg:rpm/opensuse/kernel-syms-rt&distro=openSUSE%20Leap%2015.5
Vulnerabilities (2,442)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-50290 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: media: cx24116: prevent overflows on SNR calculus as reported by Coverity, if reading SNR registers fail, a negative number will be returned, causing an underflow when reading SNR registers. Prevent that. | ||
| CVE-2024-50289 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: media: av7110: fix a spectre vulnerability As warned by smatch: drivers/staging/media/av7110/av7110_ca.c:270 dvb_ca_ioctl() warn: potential spectre issue 'av7110->ci_slot' [w] (local cap) There is a spectre-r | ||
| CVE-2024-50287 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: media: v4l2-tpg: prevent the risk of a division by zero As reported by Coverity, the logic at tpg_precalculate_line() blindly rescales the buffer even when scaled_witdh is equal to zero. If this ever happens, t | ||
| CVE-2024-50282 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a possible buffer overflow if size is larger than 4K. (cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434) | ||
| CVE-2024-50279 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: dm cache: fix out-of-bounds access to the dirty bitset when resizing dm-cache checks the dirty bits of the cache blocks to be dropped when shrinking the fast device, but an index bug in bitset iteration causes | ||
| CVE-2024-50274 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: idpf: avoid vport access in idpf_get_link_ksettings When the device control plane is removed or the platform running device control plane is rebooted, a reset is detected on the driver. On driver reset, it rele | ||
| CVE-2024-50273 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: btrfs: reinitialize delayed ref list after deleting it from the list At insert_delayed_ref() if we need to update the action of an existing ref to BTRFS_DROP_DELAYED_REF, we delete the ref from its ref head's r | ||
| CVE-2024-50271 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: signal: restore the override_rlimit logic Prior to commit d64696905554 ("Reimplement RLIMIT_SIGPENDING on top of ucounts") UCOUNT_RLIMIT_SIGPENDING rlimit was not enforced for a class of signals. However now i | ||
| CVE-2024-50269 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: usb: musb: sunxi: Fix accessing an released usb phy Commit 6ed05c68cbca ("usb: musb: sunxi: Explicitly release USB PHY on exit") will cause that usb phy @glue->xceiv is accessed after released. 1) register pla | ||
| CVE-2024-50268 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() The "*cmd" variable can be controlled by the user via debugfs. That means "new_cam" can be as high as 255 while the size of the uc-> | ||
| CVE-2024-50267 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: USB: serial: io_edgeport: fix use after free in debug printk The "dev_dbg(&urb->dev->dev, ..." which happens after usb_free_urb(urb) is a use after free of the "urb" pointer. Store the "dev" pointer at the sta | ||
| CVE-2024-50265 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() Syzkaller is able to provoke null-ptr-dereference in ocfs2_xa_remove(): [ 57.319872] (a.out,1161,7):ocfs2_xa_remove:2028 ERROR: s | ||
| CVE-2024-50264 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. T | ||
| CVE-2023-52921 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() Since the gang_size check is outside of chunk parsing loop, we need to reset i before we free the chunk data. Suggested by Ye Zhang (@VAR10CK) of Baidu Securit | ||
| CVE-2023-4134 | — | < 5.14.21-150500.13.18.1 | 5.14.21-150500.13.18.1 | Nov 14, 2024 | A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of ser | ||
| CVE-2024-50261 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 9, 2024 | In the Linux kernel, the following vulnerability has been resolved: macsec: Fix use-after-free while sending the offloading packet KASAN reports the following UAF. The metadata_dst, which is used to store the SCI value for macsec offload, is already freed by metadata_dst_free() | ||
| CVE-2024-50259 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 9, 2024 | In the Linux kernel, the following vulnerability has been resolved: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() This was found by a static analyzer. We should not forget the trailing zero after copy_from_user() if we will further | ||
| CVE-2024-50255 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 9, 2024 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs Fix __hci_cmd_sync_sk() to return not NULL for unknown opcodes. __hci_cmd_sync_sk() returns NULL if a command returns a status event. However, it | ||
| CVE-2024-50249 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 9, 2024 | In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Make rmw_lock a raw_spin_lock The following BUG was triggered: ============================= [ BUG: Invalid wait context ] 6.12.0-rc2-XXX #406 Not tainted ----------------------------- kworker/1:1/ | ||
| CVE-2024-50237 | — | < 5.14.21-150500.13.79.1 | 5.14.21-150500.13.79.1 | Nov 9, 2024 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower Avoid potentially crashing in the driver because of uninitialized private data |
- CVE-2024-50290Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: media: cx24116: prevent overflows on SNR calculus as reported by Coverity, if reading SNR registers fail, a negative number will be returned, causing an underflow when reading SNR registers. Prevent that.
- CVE-2024-50289Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: media: av7110: fix a spectre vulnerability As warned by smatch: drivers/staging/media/av7110/av7110_ca.c:270 dvb_ca_ioctl() warn: potential spectre issue 'av7110->ci_slot' [w] (local cap) There is a spectre-r
- CVE-2024-50287Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: media: v4l2-tpg: prevent the risk of a division by zero As reported by Coverity, the logic at tpg_precalculate_line() blindly rescales the buffer even when scaled_witdh is equal to zero. If this ever happens, t
- CVE-2024-50282Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a possible buffer overflow if size is larger than 4K. (cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)
- CVE-2024-50279Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: dm cache: fix out-of-bounds access to the dirty bitset when resizing dm-cache checks the dirty bits of the cache blocks to be dropped when shrinking the fast device, but an index bug in bitset iteration causes
- CVE-2024-50274Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: idpf: avoid vport access in idpf_get_link_ksettings When the device control plane is removed or the platform running device control plane is rebooted, a reset is detected on the driver. On driver reset, it rele
- CVE-2024-50273Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: btrfs: reinitialize delayed ref list after deleting it from the list At insert_delayed_ref() if we need to update the action of an existing ref to BTRFS_DROP_DELAYED_REF, we delete the ref from its ref head's r
- CVE-2024-50271Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: signal: restore the override_rlimit logic Prior to commit d64696905554 ("Reimplement RLIMIT_SIGPENDING on top of ucounts") UCOUNT_RLIMIT_SIGPENDING rlimit was not enforced for a class of signals. However now i
- CVE-2024-50269Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: usb: musb: sunxi: Fix accessing an released usb phy Commit 6ed05c68cbca ("usb: musb: sunxi: Explicitly release USB PHY on exit") will cause that usb phy @glue->xceiv is accessed after released. 1) register pla
- CVE-2024-50268Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() The "*cmd" variable can be controlled by the user via debugfs. That means "new_cam" can be as high as 255 while the size of the uc->
- CVE-2024-50267Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: USB: serial: io_edgeport: fix use after free in debug printk The "dev_dbg(&urb->dev->dev, ..." which happens after usb_free_urb(urb) is a use after free of the "urb" pointer. Store the "dev" pointer at the sta
- CVE-2024-50265Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() Syzkaller is able to provoke null-ptr-dereference in ocfs2_xa_remove(): [ 57.319872] (a.out,1161,7):ocfs2_xa_remove:2028 ERROR: s
- CVE-2024-50264Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. T
- CVE-2023-52921Nov 19, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() Since the gang_size check is outside of chunk parsing loop, we need to reset i before we free the chunk data. Suggested by Ye Zhang (@VAR10CK) of Baidu Securit
- CVE-2023-4134Nov 14, 2024affected < 5.14.21-150500.13.18.1fixed 5.14.21-150500.13.18.1
A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of ser
- CVE-2024-50261Nov 9, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: macsec: Fix use-after-free while sending the offloading packet KASAN reports the following UAF. The metadata_dst, which is used to store the SCI value for macsec offload, is already freed by metadata_dst_free()
- CVE-2024-50259Nov 9, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() This was found by a static analyzer. We should not forget the trailing zero after copy_from_user() if we will further
- CVE-2024-50255Nov 9, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs Fix __hci_cmd_sync_sk() to return not NULL for unknown opcodes. __hci_cmd_sync_sk() returns NULL if a command returns a status event. However, it
- CVE-2024-50249Nov 9, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Make rmw_lock a raw_spin_lock The following BUG was triggered: ============================= [ BUG: Invalid wait context ] 6.12.0-rc2-XXX #406 Not tainted ----------------------------- kworker/1:1/
- CVE-2024-50237Nov 9, 2024affected < 5.14.21-150500.13.79.1fixed 5.14.21-150500.13.79.1
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower Avoid potentially crashing in the driver because of uninitialized private data
Page 2 of 123