VYPR

rpm package

suse/kernel-default&distro=SUSE Manager Proxy 4.3

pkg:rpm/suse/kernel-default&distro=SUSE%20Manager%20Proxy%204.3

Vulnerabilities (1,907)

  • CVE-2022-49092Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: net: ipv4: fix route with nexthop object delete warning FRR folks have hit a kernel warning[1] while deleting routes[2] which is caused by trying to delete a route pointing to a nexthop id without specifying nh

  • CVE-2022-49091Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: drm/imx: Fix memory leak in imx_pd_connector_get_modes Avoid leaking the display mode variable if of_get_drm_display_mode fails. Addresses-Coverity-ID: 1443943 ("Resource leak")

  • CVE-2022-49090Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: arch/arm64: Fix topology initialization for core scheduling Arm64 systems rely on store_cpu_topology() to call update_siblings_masks() to transfer the toplogy to the various cpu masks. This needs to be done bef

  • CVE-2022-49089Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition The documentation of the function rvt_error_qp says both r_lock and s_lock need to be held when calling that function. It also asserts us

  • CVE-2022-49088Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe This node pointer is returned by of_find_compatible_node() with refcount incremented. Calling of_node_put() to aovid the refcount leak.

  • CVE-2022-49086Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix leak of nested actions While parsing user-provided actions, openvswitch module may dynamically allocate memory and store pointers in the internal copy of the actions. So this memory has to

  • CVE-2022-49085Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: drbd: Fix five use after free bugs in get_initial_state In get_initial_state, it calls notify_initial_state_done(skb,..) if cb->args[5]==1. If genlmsg_put() failed in notify_initial_state_done(), the skb will b

  • CVE-2022-49084Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: qede: confirm skb is allocated before using qede_build_skb() assumes build_skb() always works and goes straight to skb_reserve(). However, build_skb() can fail under memory pressure. This results in a kernel pa

  • CVE-2022-49083Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: iommu/omap: Fix regression in probe for NULL pointer dereference Commit 3f6634d997db ("iommu: Use right way to retrieve iommu_ops") started triggering a NULL pointer dereference for some omap variants: __iommu

  • CVE-2022-49082Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() The function mpt3sas_transport_port_remove() called in _scsih_expander_node_remove() frees the port field of the sas_expander structure, leadin

  • CVE-2022-49080Feb 26, 2025
    affected < 5.14.21-150400.24.153.1fixed 5.14.21-150400.24.153.1

    In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized

  • CVE-2022-49078Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: lz4: fix LZ4_decompress_safe_partial read out of bound When partialDecoding, it is EOF if we've either filled the output buffer or can't proceed with reading an offset for following match. In some extreme corn

  • CVE-2022-49076Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/hfi1: Fix use-after-free bug for mm struct Under certain conditions, such as MPI_Abort, the hfi1 cleanup code may represent the last reference held on the task mm. hfi1_mmu_rb_unregister() then drops the l

  • CVE-2022-49074Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3: Fix GICR_CTLR.RWP polling It turns out that our polling of RWP is totally wrong when checking for it in the redistributors, as we test the *distributor* bit index, whereas it is a different bit

  • CVE-2022-49073Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: ata: sata_dwc_460ex: Fix crash due to OOB write the driver uses libata's "tag" values from in various arrays. Since the mentioned patch bumped the ATA_TAG_INTERNAL to 32, the value of the SATA_DWC_QCMD_MAX need

  • CVE-2022-49066Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: veth: Ensure eth header is in skb's linear part After feeding a decapsulated packet to a veth device with act_mirred, skb_headlen() may be 0. But veth_xmit() calls __dev_forward_skb(), which expects at least ET

  • CVE-2022-49065Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix the svc_deferred_event trace class Fix a NULL deref crash that occurs when an svc_rqst is deferred while the sunrpc tracing subsystem is enabled. svc_revisit() sets dr->xprt to NULL, so it can't be

  • CVE-2022-49063Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: ice: arfs: fix use-after-free when freeing @rx_cpu_rmap The CI testing bots triggered the following splat: [ 718.203054] BUG: KASAN: use-after-free in free_irq_cpu_rmap+0x53/0x80 [ 718.206349] Read of size 4

  • CVE-2022-49061Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link When using a fixed-link, the altr_tse_pcs driver crashes due to null-pointer dereference as no phy_device is provided to tse_pcs_fix_mac_

  • CVE-2022-49060Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() dev_name() was called with dev.parent as argument but without to NULL-check it before. Solve this by checking the pointer before the call to dev_name(

Page 41 of 96