VYPR

rpm package

suse/kernel-default&distro=SUSE Manager Server 4.3

pkg:rpm/suse/kernel-default&distro=SUSE%20Manager%20Server%204.3

Vulnerabilities (1,907)

  • CVE-2024-56645Dec 27, 2024
    affected < 5.14.21-150400.24.150.1fixed 5.14.21-150400.24.150.1

    In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_session_new(): fix skb reference counting Since j1939_session_skb_queue() does an extra skb_get() for each new skb, do the same for the initial one in j1939_session_new() to avoid refcount und

  • CVE-2024-56642Dec 27, 2024
    affected < 5.14.21-150400.24.150.1fixed 5.14.21-150400.24.150.1

    In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free of kernel socket in cleanup_bearer(). syzkaller reported a use-after-free of UDP kernel socket in cleanup_bearer() without repro. [0][1] When bearer_disable() calls tipc_udp_disable(),

  • CVE-2024-56623Dec 27, 2024
    affected < 5.14.21-150400.24.150.1fixed 5.14.21-150400.24.150.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix use after free on unload System crash is observed with stack trace warning of use after free. There are 2 signals to tell dpc_thread to terminate (UNLOADING flag and kthread_stop). On settin

  • CVE-2024-56619Dec 27, 2024
    affected < 5.14.21-150400.24.147.1fixed 5.14.21-150400.24.147.1

    In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() Syzbot reported that when searching for records in a directory where the inode's i_size is corrupted and has a large value, memory access

  • CVE-2024-56605Dec 27, 2024
    affected < 5.14.21-150400.24.147.1fixed 5.14.21-150400.24.147.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() bt_sock_alloc() allocates the sk object and attaches it to the provided sock object. On error l2cap_sock_alloc() frees the sk o

  • CVE-2024-56604Dec 27, 2024
    affected < 5.14.21-150400.24.147.1fixed 5.14.21-150400.24.147.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() bt_sock_alloc() attaches allocated sk object to the provided sock object. If rfcomm_dlc_alloc() fails, we release the sk object, but l

  • CVE-2024-56602Dec 27, 2024
    affected < 5.14.21-150400.24.150.1fixed 5.14.21-150400.24.150.1

    In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() sock_init_data() attaches the allocated sk object to the provided sock object. If ieee802154_create() fails later, the allocated sk obj

  • CVE-2024-56601Dec 27, 2024
    affected < 5.14.21-150400.24.150.1fixed 5.14.21-150400.24.150.1

    In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object. If inet_create() fails later, the sk object is freed, but the sock o

  • CVE-2024-56600Dec 27, 2024
    affected < 5.14.21-150400.24.150.1fixed 5.14.21-150400.24.150.1

    In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the

  • CVE-2024-56598Dec 27, 2024
    affected < 5.14.21-150400.24.147.1fixed 5.14.21-150400.24.147.1

    In the Linux kernel, the following vulnerability has been resolved: jfs: array-index-out-of-bounds fix in dtReadFirst The value of stbl can be sometimes out of bounds due to a bad filesystem. Added a check with appopriate return of error code in that case.

  • CVE-2024-56570Dec 27, 2024
    affected < 5.14.21-150400.24.147.1fixed 5.14.21-150400.24.147.1

    In the Linux kernel, the following vulnerability has been resolved: ovl: Filter invalid inodes with missing lookup function Add a check to the ovl_dentry_weird() function to prevent the processing of directory inodes that lack the lookup function. This is important because such

  • CVE-2024-56558Dec 27, 2024
    affected < 5.14.21-150400.24.167.1fixed 5.14.21-150400.24.167.1

    In the Linux kernel, the following vulnerability has been resolved: nfsd: make sure exp active before svc_export_show The function `e_show` was called with protection from RCU. This only ensures that `exp` will not be freed. Therefore, the reference count for `exp` can drop to

  • CVE-2024-53166HigDec 27, 2024
    affected < 5.14.21-150400.24.150.1fixed 5.14.21-150400.24.150.1

    In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or remove freed bfqq from bic are both protected by bfqd->lock, however bfq_limit_depth() is deferencing bfqq from bic without the loc

  • CVE-2024-56548Dec 27, 2024
    affected < 5.14.21-150400.24.147.1fixed 5.14.21-150400.24.147.1

    In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't query the device logical block size multiple times Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like

  • CVE-2024-56539Dec 27, 2024
    affected < 5.14.21-150400.24.147.1fixed 5.14.21-150400.24.147.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() Replace one-element array with a flexible-array member in `struct mwifiex_ie_types_wildcard_ssid_params` to fix the following wa

  • CVE-2024-53239Dec 27, 2024
    affected < 5.14.21-150400.24.147.1fixed 5.14.21-150400.24.147.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: 6fire: Release resources at card release The current 6fire code tries to release the resources right after the call of usb6fire_chip_abort(). But at this moment, the card object might be still in use (as

  • CVE-2024-53214Dec 27, 2024
    affected < 5.14.21-150400.24.147.1fixed 5.14.21-150400.24.147.1

    In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Properly hide first-in-list PCIe extended capability There are cases where a PCIe extended capability should be hidden from the user. For example, an unknown capability (i.e., capability with ID great

  • CVE-2024-53206Dec 27, 2024
    affected < 5.14.21-150400.24.147.1fixed 5.14.21-150400.24.147.1

    In the Linux kernel, the following vulnerability has been resolved: tcp: Fix use-after-free of nreq in reqsk_timer_handler(). The cited commit replaced inet_csk_reqsk_queue_drop_and_put() with __inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler(). Then, oreq s

  • CVE-2024-53179Dec 27, 2024
    affected < 5.14.21-150400.24.147.1fixed 5.14.21-150400.24.147.1

    In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free of signing key Customers have reported use-after-free in @ses->auth_key.response with SMB2.1 + sign mounts which occurs due to following race: task A tas

  • CVE-2024-53177Dec 27, 2024
    affected < 5.14.21-150400.24.150.1fixed 5.14.21-150400.24.150.1

    In the Linux kernel, the following vulnerability has been resolved: smb: prevent use-after-free due to open_cached_dir error paths If open_cached_dir() encounters an error parsing the lease from the server, the error handling may race with receiving a lease break, resulting in

Page 45 of 96