rpm package
suse/kernel-default-base&distro=SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOS
Vulnerabilities (2,830)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-48847 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: watch_queue: Fix filter limit check In watch_queue_set_filter(), there are a couple of places where we check that the filter type value does not exceed what the type_filter bitmap can hold. One place calculate | ||
| CVE-2022-48842 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: ice: Fix race condition during interface enslave Commit 5dbbbd01cbba83 ("ice: Avoid RTNL lock when re-creating auxiliary device") changes a process of re-creation of aux device so ice_plug_aux_dev() is called f | ||
| CVE-2022-48841 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats() It is possible to do NULL pointer dereference in routine that updates Tx ring stats. Currently only stats and bytes are updated when ring poin | ||
| CVE-2022-48840 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: iavf: Fix hang during reboot/shutdown Recent commit 974578017fc1 ("iavf: Add waiting so the port is initialized in remove") adds a wait-loop at the beginning of iavf_remove() to ensure that port initialization | ||
| CVE-2022-48839 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: net/packet: fix slab-out-of-bounds access in packet_recvmsg() syzbot found that when an AF_PACKET socket is using PACKET_COPY_THRESH and mmap operations, tpacket_rcv() is queueing skbs with garbage in skb->cb[] | ||
| CVE-2022-48838 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: usb: gadget: Fix use-after-free bug by not setting udc->dev.driver The syzbot fuzzer found a use-after-free bug: BUG: KASAN: use-after-free in dev_uevent+0x712/0x780 drivers/base/core.c:2320 Read of size 8 at | ||
| CVE-2022-48837 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: usb: gadget: rndis: prevent integer overflow in rndis_set_response() If "BufOffset" is very large the "BufOffset + 8" operation can have an integer overflow. | ||
| CVE-2022-48836 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: Input: aiptek - properly check endpoint type Syzbot reported warning in usb_submit_urb() which is caused by wrong endpoint type. There was a check for the number of endpoints, but not for the type of endpoint. | ||
| CVE-2022-48835 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Page fault in reply q processing A page fault was encountered in mpt3sas on a LUN reset error path: [ 145.763216] mpt3sas_cm1: Task abort tm failed: handle(0x0002),timeout(30) tr_method(0x0) sm | ||
| CVE-2022-48834 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: usb: usbtmc: Fix bug in pipe direction for control transfers The syzbot fuzzer reported a minor bug in the usbtmc driver: usb 5-1: BOGUS control dir, pipe 80001e80 doesn't match bRequestType 0 WARNING: CPU: 0 | ||
| CVE-2022-48829 | Med | 5.5 | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes iattr::ia_size is a loff_t, so these NFSv3 procedures must be careful to deal with incoming client size values that are larger than s64_max without | |
| CVE-2022-48828 | Med | 5.5 | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix ia_size underflow iattr::ia_size is a loff_t, which is a signed 64-bit type. NFSv3 and NFSv4 both define file size as an unsigned 64-bit type. Thus there is a range of valid file size values an NFS cl | |
| CVE-2022-48827 | Hig | 7.1 | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix the behavior of READ near OFFSET_MAX Dan Aloni reports: > Due to commit 8cfb9015280d ("NFS: Always provide aligned buffers to > the RPC read layers") on the client, a read of 0xfff is aligned up > to | |
| CVE-2022-48831 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: ima: fix reference leak in asymmetric_verify() Don't leak a reference to the key if its algorithm is unknown. | ||
| CVE-2022-48830 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: can: isotp: fix potential CAN frame reception race in isotp_rcv() When receiving a CAN frame the current code logic does not consider concurrently receiving processes which do not show up in real world usage. | ||
| CVE-2022-48826 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/vc4: Fix deadlock on DSI device attach error DSI device attach to DSI host will be done with host device's lock held. Un-registering host in "device attach" error path (ex: probe retry) will result in dead | ||
| CVE-2022-48825 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Add stag_work to all the vports Call trace seen when creating NPIV ports, only 32 out of 64 show online. stag work was not initialized for vport, hence initialize the stag work. WARNING: CPU: 8 PID | ||
| CVE-2022-48824 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: scsi: myrs: Fix crash in error case In myrs_detect(), cs->disable_intr is NULL when privdata->hw_init() fails with non-zero. In this case, myrs_cleanup(cs) will call a NULL ptr and crash the kernel. [ 1.105 | ||
| CVE-2022-48823 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Fix refcount issue when LOGO is received during TMF Hung task call trace was seen during LOGO processing. [ 974.309060] [0000:00:00.0]:[qedf_eh_device_reset:868]: 1:0:2:0: LUN RESET Issued... [ 9 | ||
| CVE-2022-48822 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | Jul 16, 2024 | In the Linux kernel, the following vulnerability has been resolved: usb: f_fs: Fix use-after-free for epfile Consider a case where ffs_func_eps_disable is called from ffs_func_disable as part of composition switch and at the same time ffs_epfile_release get called from userspac |
- CVE-2022-48847Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: watch_queue: Fix filter limit check In watch_queue_set_filter(), there are a couple of places where we check that the filter type value does not exceed what the type_filter bitmap can hold. One place calculate
- CVE-2022-48842Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: ice: Fix race condition during interface enslave Commit 5dbbbd01cbba83 ("ice: Avoid RTNL lock when re-creating auxiliary device") changes a process of re-creation of aux device so ice_plug_aux_dev() is called f
- CVE-2022-48841Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats() It is possible to do NULL pointer dereference in routine that updates Tx ring stats. Currently only stats and bytes are updated when ring poin
- CVE-2022-48840Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: iavf: Fix hang during reboot/shutdown Recent commit 974578017fc1 ("iavf: Add waiting so the port is initialized in remove") adds a wait-loop at the beginning of iavf_remove() to ensure that port initialization
- CVE-2022-48839Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: net/packet: fix slab-out-of-bounds access in packet_recvmsg() syzbot found that when an AF_PACKET socket is using PACKET_COPY_THRESH and mmap operations, tpacket_rcv() is queueing skbs with garbage in skb->cb[]
- CVE-2022-48838Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: Fix use-after-free bug by not setting udc->dev.driver The syzbot fuzzer found a use-after-free bug: BUG: KASAN: use-after-free in dev_uevent+0x712/0x780 drivers/base/core.c:2320 Read of size 8 at
- CVE-2022-48837Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: rndis: prevent integer overflow in rndis_set_response() If "BufOffset" is very large the "BufOffset + 8" operation can have an integer overflow.
- CVE-2022-48836Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: Input: aiptek - properly check endpoint type Syzbot reported warning in usb_submit_urb() which is caused by wrong endpoint type. There was a check for the number of endpoints, but not for the type of endpoint.
- CVE-2022-48835Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Page fault in reply q processing A page fault was encountered in mpt3sas on a LUN reset error path: [ 145.763216] mpt3sas_cm1: Task abort tm failed: handle(0x0002),timeout(30) tr_method(0x0) sm
- CVE-2022-48834Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: usb: usbtmc: Fix bug in pipe direction for control transfers The syzbot fuzzer reported a minor bug in the usbtmc driver: usb 5-1: BOGUS control dir, pipe 80001e80 doesn't match bRequestType 0 WARNING: CPU: 0
- affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes iattr::ia_size is a loff_t, so these NFSv3 procedures must be careful to deal with incoming client size values that are larger than s64_max without
- affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix ia_size underflow iattr::ia_size is a loff_t, which is a signed 64-bit type. NFSv3 and NFSv4 both define file size as an unsigned 64-bit type. Thus there is a range of valid file size values an NFS cl
- affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix the behavior of READ near OFFSET_MAX Dan Aloni reports: > Due to commit 8cfb9015280d ("NFS: Always provide aligned buffers to > the RPC read layers") on the client, a read of 0xfff is aligned up > to
- CVE-2022-48831Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: ima: fix reference leak in asymmetric_verify() Don't leak a reference to the key if its algorithm is unknown.
- CVE-2022-48830Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: can: isotp: fix potential CAN frame reception race in isotp_rcv() When receiving a CAN frame the current code logic does not consider concurrently receiving processes which do not show up in real world usage.
- CVE-2022-48826Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: drm/vc4: Fix deadlock on DSI device attach error DSI device attach to DSI host will be done with host device's lock held. Un-registering host in "device attach" error path (ex: probe retry) will result in dead
- CVE-2022-48825Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Add stag_work to all the vports Call trace seen when creating NPIV ports, only 32 out of 64 show online. stag work was not initialized for vport, hence initialize the stag work. WARNING: CPU: 8 PID
- CVE-2022-48824Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: scsi: myrs: Fix crash in error case In myrs_detect(), cs->disable_intr is NULL when privdata->hw_init() fails with non-zero. In this case, myrs_cleanup(cs) will call a NULL ptr and crash the kernel. [ 1.105
- CVE-2022-48823Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Fix refcount issue when LOGO is received during TMF Hung task call trace was seen during LOGO processing. [ 974.309060] [0000:00:00.0]:[qedf_eh_device_reset:868]: 1:0:2:0: LUN RESET Issued... [ 9
- CVE-2022-48822Jul 16, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: usb: f_fs: Fix use-after-free for epfile Consider a case where ffs_func_eps_disable is called from ffs_func_disable as part of composition switch and at the same time ffs_epfile_release get called from userspac
Page 103 of 142