VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS

Vulnerabilities (2,310)

  • CVE-2024-56755Dec 29, 2024
    affected < 5.14.21-150500.55.91.1fixed 5.14.21-150500.55.91.1

    In the Linux kernel, the following vulnerability has been resolved: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING In fscache_create_volume(), there is a missing memory barrier between the bit-clearing operation and the wake-up operation. This may cause a situa

  • CVE-2024-56754Dec 29, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: caam - Fix the pointer passed to caam_qi_shutdown() The type of the last parameter given to devm_add_action_or_reset() is "struct caam_drv_private *", but in caam_qi_shutdown(), it is casted to "struct

  • CVE-2024-56747Dec 29, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() Hook "qedi_ops->common->sb_init = qed_sb_init" does not release the DMA memory sb_virt when it fails. Add dma_free_coherent() to free it. This

  • CVE-2024-56745Dec 29, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: PCI: Fix reset_method_store() memory leak In reset_method_store(), a string is allocated via kstrndup() and assigned to the local "options". options is then used in with strsep() to find spaces: while ((name

  • CVE-2024-56739Dec 29, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() If the __rtc_read_time call fails,, the struct rtc_time tm; may contain uninitialized data, or an illegal date/time read from the RTC hardware

  • CVE-2024-56722Dec 29, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix cpu stuck caused by printings during reset During reset, cmd to destroy resources such as qp, cq, and mr may fail, and error logs will be printed. When a large number of resources are destroyed, t

  • CVE-2024-56704Dec 28, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: 9p/xen: fix release of IRQ Kernel logs indicate an IRQ was double-freed. Pass correct device ID during IRQ release. [Dominique: remove confusing variable reset to 0]

  • CVE-2024-56701Dec 28, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore The dtl_access_lock needs to be a rw_sempahore, a sleeping lock, because the code calls kmalloc() while holding it, which can sleep: # echo 1 > /proc

  • CVE-2024-56698Dec 28, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Fix looping of queued SG entries The dwc3_request->num_queued_sgs is decremented on completion. If a partially completed request is handled, then the dwc3_request->num_queued_sgs no longer re

  • CVE-2024-56681Dec 28, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: bcm - add error check in the ahash_hmac_init function The ahash_init functions may return fails. The ahash_hmac_init should not return ok when ahash_init returns error. For an example, ahash_init will r

  • CVE-2024-56678Dec 28, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: powerpc/mm/fault: Fix kfence page fault reporting copy_from_kernel_nofault() can be called when doing read of /proc/kcore. /proc/kcore can have some unmapped kfence objects which when read via copy_from_kernel_

  • CVE-2024-56631HigDec 27, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Fix slab-use-after-free read in sg_release() Fix a use-after-free bug in sg_release(), detected by syzbot with KASAN: BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockde

  • CVE-2024-56557MedDec 27, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer The AD7923 was updated to support devices with 8 channels, but the size of tx_buf and ring_xfer was not increased accordingly, leading to a potenti

  • CVE-2024-56664Dec 27, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix race between element replace and close() Element replace (with a socket different from the one stored) may race with socket's close() link popping & unlinking. __sock_map_delete() unconditiona

  • CVE-2024-56661Dec 27, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: tipc: fix NULL deref in cleanup_bearer() syzbot found [1] that after blamed commit, ub->ubsock->sk was NULL when attempting the atomic_dec() : atomic_dec(&tipc_net(sock_net(ub->ubsock->sk))->wq_count); Fix th

  • CVE-2024-56658Dec 27, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-after-free in dst_destroy [1] Issue is in xfrm6_net_init() and xfrm4_net_init() : They copy xfrm[46]_dst_ops_template into net->x

  • CVE-2024-56651Dec 27, 2024
    affected < 5.14.21-150500.55.100.1fixed 5.14.21-150500.55.100.1

    In the Linux kernel, the following vulnerability has been resolved: can: hi311x: hi3110_can_ist(): fix potential use-after-free The commit a22bd630cfff ("can: hi311x: do not report txerr and rxerr during bus-off") removed the reporting of rxerr and txerr even in case of correct

  • CVE-2024-56650Dec 27, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the following BUG detected by KASAN: BUG: KASAN: slab-out-of-bounds in strlen+0x58/0x70 Read of size 1 at addr ffff8881022da0c8 by ta

  • CVE-2024-56648Dec 27, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: net: hsr: avoid potential out-of-bound access in fill_frame_info() syzbot is able to feed a packet with 14 bytes, pretending it is a vlan one. Since fill_frame_info() is relying on skb->mac_len already, extend

  • CVE-2024-56645Dec 27, 2024
    affected < 5.14.21-150500.55.94.1fixed 5.14.21-150500.55.94.1

    In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_session_new(): fix skb reference counting Since j1939_session_skb_queue() does an extra skb_get() for each new skb, do the same for the initial one in j1939_session_new() to avoid refcount und

Page 105 of 116