rpm package
opensuse/klp-build&distro=openSUSE Tumbleweed
pkg:rpm/opensuse/klp-build&distro=openSUSE%20Tumbleweed
Vulnerabilities (5)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-40909 | — | < 0~20240812.ad9f0e0-1.1 | 0~20240812.ad9f0e0-1.1 | Jul 12, 2024 | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a potential use-after-free in bpf_link_free() After commit 1a80dbcb2dba, bpf_link can be freed by link->ops->dealloc_deferred, but the code still tests and uses link->ops->dealloc afterward, which lead | ||
| CVE-2024-36921 | — | < 0~20240902.c95cc9e-1.1 | 0~20240902.c95cc9e-1.1 | May 30, 2024 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: guard against invalid STA ID on removal Guard against invalid station IDs in iwl_mvm_mld_rm_sta_id as that would result in out-of-bounds array accesses. This prevents issues should the drive | ||
| CVE-2021-47402 | — | < 0~20240731.edfe0bf-1.1 | 0~20240731.edfe0bf-1.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: sched: flower: protect fl_walk() with rcu Patch that refactored fl_walk() to use idr_for_each_entry_continue_ul() also removed rcu protection of individual filters which causes following use-after-free whe | ||
| CVE-2024-35817 | — | < 0~20240902.c95cc9e-1.1 | 0~20240902.c95cc9e-1.1 | May 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid | ||
| CVE-2024-0775 | — | < 0~20240902.c95cc9e-1.1 | 0~20240902.c95cc9e-1.1 | Jan 22, 2024 | A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free. |
- CVE-2024-40909Jul 12, 2024affected < 0~20240812.ad9f0e0-1.1fixed 0~20240812.ad9f0e0-1.1
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a potential use-after-free in bpf_link_free() After commit 1a80dbcb2dba, bpf_link can be freed by link->ops->dealloc_deferred, but the code still tests and uses link->ops->dealloc afterward, which lead
- CVE-2024-36921May 30, 2024affected < 0~20240902.c95cc9e-1.1fixed 0~20240902.c95cc9e-1.1
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: guard against invalid STA ID on removal Guard against invalid station IDs in iwl_mvm_mld_rm_sta_id as that would result in out-of-bounds array accesses. This prevents issues should the drive
- CVE-2021-47402May 21, 2024affected < 0~20240731.edfe0bf-1.1fixed 0~20240731.edfe0bf-1.1
In the Linux kernel, the following vulnerability has been resolved: net: sched: flower: protect fl_walk() with rcu Patch that refactored fl_walk() to use idr_for_each_entry_continue_ul() also removed rcu protection of individual filters which causes following use-after-free whe
- CVE-2024-35817May 17, 2024affected < 0~20240902.c95cc9e-1.1fixed 0~20240902.c95cc9e-1.1
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid
- CVE-2024-0775Jan 22, 2024affected < 0~20240902.c95cc9e-1.1fixed 0~20240902.c95cc9e-1.1
A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.