VYPR

rpm package

opensuse/klp-build&distro=openSUSE Tumbleweed

pkg:rpm/opensuse/klp-build&distro=openSUSE%20Tumbleweed

Vulnerabilities (5)

  • CVE-2024-40909Jul 12, 2024
    affected < 0~20240812.ad9f0e0-1.1fixed 0~20240812.ad9f0e0-1.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a potential use-after-free in bpf_link_free() After commit 1a80dbcb2dba, bpf_link can be freed by link->ops->dealloc_deferred, but the code still tests and uses link->ops->dealloc afterward, which lead

  • CVE-2024-36921May 30, 2024
    affected < 0~20240902.c95cc9e-1.1fixed 0~20240902.c95cc9e-1.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: guard against invalid STA ID on removal Guard against invalid station IDs in iwl_mvm_mld_rm_sta_id as that would result in out-of-bounds array accesses. This prevents issues should the drive

  • CVE-2021-47402May 21, 2024
    affected < 0~20240731.edfe0bf-1.1fixed 0~20240731.edfe0bf-1.1

    In the Linux kernel, the following vulnerability has been resolved: net: sched: flower: protect fl_walk() with rcu Patch that refactored fl_walk() to use idr_for_each_entry_continue_ul() also removed rcu protection of individual filters which causes following use-after-free whe

  • CVE-2024-35817May 17, 2024
    affected < 0~20240902.c95cc9e-1.1fixed 0~20240902.c95cc9e-1.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid

  • CVE-2024-0775Jan 22, 2024
    affected < 0~20240902.c95cc9e-1.1fixed 0~20240902.c95cc9e-1.1

    A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.