rpm package
suse/kernel-default-base&distro=SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOS
Vulnerabilities (2,830)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-52628 | — | < 5.14.21-150400.24.119.1.150400.24.56.1 | 5.14.21-150400.24.119.1.150400.24.56.1 | Mar 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: exthdr: fix 4-byte stack OOB write If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption. This construct is necessary to c | ||
| CVE-2023-52621 | — | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 26, 2024 | In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers These three bpf_map_{lookup,update,delete}_elem() helpers are also available for sleepable bpf program, so add the corresponding lock asserti | ||
| CVE-2024-26643 | Med | 5.5 | < 5.14.21-150400.24.173.1.150400.24.88.1 | 5.14.21-150400.24.173.1.150400.24.88.1 | Mar 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout While the rhashtable set gc runs asynchronously, a race allows it to collect elements from anonymous sets with timeouts while it | |
| CVE-2024-26642 | Med | 5.5 | < 5.14.21-150400.24.119.1.150400.24.56.1 | 5.14.21-150400.24.119.1.150400.24.56.1 | Mar 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets are never used with timeout from userspace, reject this. Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work. | |
| CVE-2023-52616 | — | < 5.14.21-150400.24.119.1.150400.24.56.1 | 5.14.21-150400.24.119.1.150400.24.56.1 | Mar 18, 2024 | In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init When the mpi_ec_ctx structure is initialized, some fields are not cleared, causing a crash when referencing the field when the structure was releas | ||
| CVE-2023-28746 | Med | 6.5 | < 5.14.21-150400.24.111.2.150400.24.52.1 | 5.14.21-150400.24.111.2.150400.24.52.1 | Mar 14, 2024 | Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | |
| CVE-2023-52607 | — | < 5.14.21-150400.24.119.1.150400.24.56.1 | 5.14.21-150400.24.119.1.150400.24.56.1 | Mar 6, 2024 | In the Linux kernel, the following vulnerability has been resolved: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the p | ||
| CVE-2023-52597 | — | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 6, 2024 | In the Linux kernel, the following vulnerability has been resolved: KVM: s390: fix setting of fpc register kvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control (fpc) register of a guest cpu. The new value is tested for validity by temporarily loading it into t | ||
| CVE-2023-52591 | — | < 5.14.21-150400.24.119.1.150400.24.56.1 | 5.14.21-150400.24.119.1.150400.24.56.1 | Mar 6, 2024 | In the Linux kernel, the following vulnerability has been resolved: reiserfs: Avoid touching renamed directory if parent does not change The VFS will not be locking moved directory if its parent does not change. Change reiserfs rename code to avoid touching renamed directory if | ||
| CVE-2023-52590 | — | < 5.14.21-150400.24.119.1.150400.24.56.1 | 5.14.21-150400.24.119.1.150400.24.56.1 | Mar 6, 2024 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: Avoid touching renamed directory if parent does not change The VFS will not be locking moved directory if its parent does not change. Change ocfs2 rename code to avoid touching renamed directory if its p | ||
| CVE-2023-52583 | — | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 6, 2024 | In the Linux kernel, the following vulnerability has been resolved: ceph: fix deadlock or deadcode of misusing dget() The lock order is incorrect between denty and its parent, we should always make sure that the parent get the lock first. But since this deadcode is never used | ||
| CVE-2022-48630 | — | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 5, 2024 | In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'ma | ||
| CVE-2022-48629 | — | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 5, 2024 | In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - ensure buffer for generate is completely filled The generate function in struct rng_alg expects that the destination buffer is completely filled if the function returns 0. qcom_rng_read() can | ||
| CVE-2021-47107 | Hig | 7.8 | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 4, 2024 | In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix READDIR buffer overflow If a client sends a READDIR count argument that is too small (say, zero), then the buffer size calculation in the new init_dirlist helper functions results in an underflow, all | |
| CVE-2021-47108 | — | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 4, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf In commit 41ca9caaae0b ("drm/mediatek: hdmi: Add check for CEA modes only") a check for CEA modes was added to function mtk_hdmi_bridge_mode_vali | ||
| CVE-2021-47105 | — | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 4, 2024 | In the Linux kernel, the following vulnerability has been resolved: ice: xsk: return xsk buffers back to pool when cleaning the ring Currently we only NULL the xdp_buff pointer in the internal SW ring but we never give it back to the xsk buffer pool. This means that buffers can | ||
| CVE-2021-47104 | — | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 4, 2024 | In the Linux kernel, the following vulnerability has been resolved: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() The wrong goto label was used for the error case and missed cleanup of the pkt allocation. Addresses-Coverity-ID: 1493352 ("Resource leak") | ||
| CVE-2021-47102 | — | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 4, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix incorrect structure access In line: upper = info->upper_dev; We access upper_dev field, which is related only for particular events (e.g. event == NETDEV_CHANGEUPPER). So, this line | ||
| CVE-2021-47101 | — | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 4, 2024 | In the Linux kernel, the following vulnerability has been resolved: asix: fix uninit-value in asix_mdio_read() asix_read_cmd() may read less than sizeof(smsr) bytes and in this case smsr will be uninitialized. Fail log: BUG: KMSAN: uninit-value in asix_check_host_enable driver | ||
| CVE-2021-47100 | — | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | Mar 4, 2024 | In the Linux kernel, the following vulnerability has been resolved: ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module Hi, When testing install and uninstall of ipmi_si.ko and ipmi_msghandler.ko, the system crashed. The log as follows: [ 141.087026] BUG: unable |
- CVE-2023-52628Mar 28, 2024affected < 5.14.21-150400.24.119.1.150400.24.56.1fixed 5.14.21-150400.24.119.1.150400.24.56.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: exthdr: fix 4-byte stack OOB write If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption. This construct is necessary to c
- CVE-2023-52621Mar 26, 2024affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers These three bpf_map_{lookup,update,delete}_elem() helpers are also available for sleepable bpf program, so add the corresponding lock asserti
- affected < 5.14.21-150400.24.173.1.150400.24.88.1fixed 5.14.21-150400.24.173.1.150400.24.88.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout While the rhashtable set gc runs asynchronously, a race allows it to collect elements from anonymous sets with timeouts while it
- affected < 5.14.21-150400.24.119.1.150400.24.56.1fixed 5.14.21-150400.24.119.1.150400.24.56.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets are never used with timeout from userspace, reject this. Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work.
- CVE-2023-52616Mar 18, 2024affected < 5.14.21-150400.24.119.1.150400.24.56.1fixed 5.14.21-150400.24.119.1.150400.24.56.1
In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init When the mpi_ec_ctx structure is initialized, some fields are not cleared, causing a crash when referencing the field when the structure was releas
- affected < 5.14.21-150400.24.111.2.150400.24.52.1fixed 5.14.21-150400.24.111.2.150400.24.52.1
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2023-52607Mar 6, 2024affected < 5.14.21-150400.24.119.1.150400.24.56.1fixed 5.14.21-150400.24.119.1.150400.24.56.1
In the Linux kernel, the following vulnerability has been resolved: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the p
- CVE-2023-52597Mar 6, 2024affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: KVM: s390: fix setting of fpc register kvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control (fpc) register of a guest cpu. The new value is tested for validity by temporarily loading it into t
- CVE-2023-52591Mar 6, 2024affected < 5.14.21-150400.24.119.1.150400.24.56.1fixed 5.14.21-150400.24.119.1.150400.24.56.1
In the Linux kernel, the following vulnerability has been resolved: reiserfs: Avoid touching renamed directory if parent does not change The VFS will not be locking moved directory if its parent does not change. Change reiserfs rename code to avoid touching renamed directory if
- CVE-2023-52590Mar 6, 2024affected < 5.14.21-150400.24.119.1.150400.24.56.1fixed 5.14.21-150400.24.119.1.150400.24.56.1
In the Linux kernel, the following vulnerability has been resolved: ocfs2: Avoid touching renamed directory if parent does not change The VFS will not be locking moved directory if its parent does not change. Change ocfs2 rename code to avoid touching renamed directory if its p
- CVE-2023-52583Mar 6, 2024affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: ceph: fix deadlock or deadcode of misusing dget() The lock order is incorrect between denty and its parent, we should always make sure that the parent get the lock first. But since this deadcode is never used
- CVE-2022-48630Mar 5, 2024affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'ma
- CVE-2022-48629Mar 5, 2024affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - ensure buffer for generate is completely filled The generate function in struct rng_alg expects that the destination buffer is completely filled if the function returns 0. qcom_rng_read() can
- affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix READDIR buffer overflow If a client sends a READDIR count argument that is too small (say, zero), then the buffer size calculation in the new init_dirlist helper functions results in an underflow, all
- CVE-2021-47108Mar 4, 2024affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf In commit 41ca9caaae0b ("drm/mediatek: hdmi: Add check for CEA modes only") a check for CEA modes was added to function mtk_hdmi_bridge_mode_vali
- CVE-2021-47105Mar 4, 2024affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: ice: xsk: return xsk buffers back to pool when cleaning the ring Currently we only NULL the xdp_buff pointer in the internal SW ring but we never give it back to the xsk buffer pool. This means that buffers can
- CVE-2021-47104Mar 4, 2024affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() The wrong goto label was used for the error case and missed cleanup of the pkt allocation. Addresses-Coverity-ID: 1493352 ("Resource leak")
- CVE-2021-47102Mar 4, 2024affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix incorrect structure access In line: upper = info->upper_dev; We access upper_dev field, which is related only for particular events (e.g. event == NETDEV_CHANGEUPPER). So, this line
- CVE-2021-47101Mar 4, 2024affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: asix: fix uninit-value in asix_mdio_read() asix_read_cmd() may read less than sizeof(smsr) bytes and in this case smsr will be uninitialized. Fail log: BUG: KMSAN: uninit-value in asix_check_host_enable driver
- CVE-2021-47100Mar 4, 2024affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel, the following vulnerability has been resolved: ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module Hi, When testing install and uninstall of ipmi_si.ko and ipmi_msghandler.ko, the system crashed. The log as follows: [ 141.087026] BUG: unable
Page 131 of 142