rpm package
suse/kernel-default-base&distro=SUSE Linux Enterprise Micro 5.2
pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.2
Vulnerabilities (1,696)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-49936 | — | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net/xen-netback: prevent UAF in xenvif_flush_hash() During the list_for_each_entry_rcu iteration call of xenvif_flush_hash, kfree_rcu does not exist inside the rcu read critical section, so if kfree_rcu is call | ||
| CVE-2024-49925 | — | < 5.3.18-150300.59.185.1.150300.18.109.1 | 5.3.18-150300.59.185.1.150300.18.109.1 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: fbdev: efifb: Register sysfs groups through driver core The driver core can register and cleanup sysfs groups already. Make use of that functionality to simplify the error handling and cleanup. Also avoid a UA | ||
| CVE-2024-49867 | — | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: btrfs: wait for fixup workers before stopping cleaner kthread during umount During unmount, at close_ctree(), we have the following steps in this order: 1) Park the cleaner kthread - this doesn't destroy the k | ||
| CVE-2024-47747 | Hig | 7.0 | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition In the ether3_probe function, a timer is initialized with a callback function ether3_ledoff, bound to &prev(dev)->timer. Once t | |
| CVE-2024-49860 | — | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: ACPI: sysfs: validate return type of _STR method Only buffer objects are valid return values of _STR. If something else is returned description_show() will access invalid memory. | ||
| CVE-2024-47706 | Med | 5.5 | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix possible UAF for bfqq->bic with merge chain 1) initial state, three tasks: Process 1 Process 2 Process 3 (BIC1) (BIC2) (BIC3) | Λ | Λ | Λ | | | |
| CVE-2024-47684 | Med | 5.5 | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_r | |
| CVE-2024-47674 | — | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Oct 15, 2024 | In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it | ||
| CVE-2024-47668 | — | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Oct 9, 2024 | In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() If we need to increase the tree depth, allocate a new node, and then race with another thread that increased the tree depth before us, we'll sti | ||
| CVE-2024-46849 | Hig | 7.8 | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Sep 27, 2024 | In the Linux kernel, the following vulnerability has been resolved: ASoC: meson: axg-card: fix 'use-after-free' Buffer 'card->dai_link' is reallocated in 'meson_card_reallocate_links()', so move 'pad' pointer initialization after this function when memory is already reallocated | |
| CVE-2024-46813 | Hig | 7.8 | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Sep 27, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check link_index before accessing dc->links[] [WHY & HOW] dc->links[] has max size of MAX_LINKS and NULL is return when trying to access with out-of-bound index. This fixes 3 OVERRUN and 1 RES | |
| CVE-2024-46818 | — | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Sep 27, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check gpio_id before used as array index [WHY & HOW] GPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore should be checked in advance. This fixes 5 OVERRUN issues reported | ||
| CVE-2024-46817 | — | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Sep 27, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 [Why] Coverity reports OVERRUN warning. Should abort amdgpu_dm initialize. [How] Return failure to amdgpu_dm_init. | ||
| CVE-2024-46816 | — | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Sep 27, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links [Why] Coverity report OVERRUN warning. There are only max_links elements within dc->links. link count could up to AMDGPU_DM_MAX_D | ||
| CVE-2024-46814 | — | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Sep 27, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check msg_id before processing transcation [WHY & HOW] HDCP_MESSAGE_ID_INVALID (-1) is not a valid msg_id nor is it a valid array index, and it needs checking before used. This fixes 4 OVERRUN | ||
| CVE-2022-48945 | — | < 5.3.18-150300.59.179.1.150300.18.105.2 | 5.3.18-150300.59.179.1.150300.18.105.2 | Sep 23, 2024 | In the Linux kernel, the following vulnerability has been resolved: media: vivid: fix compose size exceed boundary syzkaller found a bug: BUG: unable to handle page fault for address: ffffc9000a3b1000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not | ||
| CVE-2024-46800 | — | < 5.3.18-150300.59.211.1.150300.18.126.1 | 5.3.18-150300.59.211.1.150300.18.126.1 | Sep 18, 2024 | In the Linux kernel, the following vulnerability has been resolved: sch/netem: fix use after free in netem_dequeue If netem_dequeue() enqueues packet to inner qdisc and that qdisc returns __NET_XMIT_STOLEN. The packet is dropped but qdisc_tree_reduce_backlog() is not called to | ||
| CVE-2024-46774 | — | < 5.3.18-150300.59.179.1.150300.18.105.2 | 5.3.18-150300.59.179.1.150300.18.105.2 | Sep 18, 2024 | In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() Smatch warns: arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() warn: potential spectre issue 'args.args' [r] (local cap) The 'nargs' and ' | ||
| CVE-2024-46695 | — | < 5.3.18-150300.59.179.1.150300.18.105.2 | 5.3.18-150300.59.179.1.150300.18.105.2 | Sep 13, 2024 | In the Linux kernel, the following vulnerability has been resolved: selinux,smack: don't bypass permissions check in inode_setsecctx hook Marek Gresko reports that the root user on an NFS client is able to change the security labels on files on an NFS filesystem that is exporte | ||
| CVE-2024-45016 | Med | 5.5 | < 5.3.18-150300.59.182.1.150300.18.107.1 | 5.3.18-150300.59.182.1.150300.18.107.1 | Sep 11, 2024 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. |
- CVE-2024-49936Oct 21, 2024affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: net/xen-netback: prevent UAF in xenvif_flush_hash() During the list_for_each_entry_rcu iteration call of xenvif_flush_hash, kfree_rcu does not exist inside the rcu read critical section, so if kfree_rcu is call
- CVE-2024-49925Oct 21, 2024affected < 5.3.18-150300.59.185.1.150300.18.109.1fixed 5.3.18-150300.59.185.1.150300.18.109.1
In the Linux kernel, the following vulnerability has been resolved: fbdev: efifb: Register sysfs groups through driver core The driver core can register and cleanup sysfs groups already. Make use of that functionality to simplify the error handling and cleanup. Also avoid a UA
- CVE-2024-49867Oct 21, 2024affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: btrfs: wait for fixup workers before stopping cleaner kthread during umount During unmount, at close_ctree(), we have the following steps in this order: 1) Park the cleaner kthread - this doesn't destroy the k
- affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition In the ether3_probe function, a timer is initialized with a callback function ether3_ledoff, bound to &prev(dev)->timer. Once t
- CVE-2024-49860Oct 21, 2024affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: ACPI: sysfs: validate return type of _STR method Only buffer objects are valid return values of _STR. If something else is returned description_show() will access invalid memory.
- affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix possible UAF for bfqq->bic with merge chain 1) initial state, three tasks: Process 1 Process 2 Process 3 (BIC1) (BIC2) (BIC3) | Λ | Λ | Λ | |
- affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_r
- CVE-2024-47674Oct 15, 2024affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it
- CVE-2024-47668Oct 9, 2024affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() If we need to increase the tree depth, allocate a new node, and then race with another thread that increased the tree depth before us, we'll sti
- affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: ASoC: meson: axg-card: fix 'use-after-free' Buffer 'card->dai_link' is reallocated in 'meson_card_reallocate_links()', so move 'pad' pointer initialization after this function when memory is already reallocated
- affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check link_index before accessing dc->links[] [WHY & HOW] dc->links[] has max size of MAX_LINKS and NULL is return when trying to access with out-of-bound index. This fixes 3 OVERRUN and 1 RES
- CVE-2024-46818Sep 27, 2024affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check gpio_id before used as array index [WHY & HOW] GPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore should be checked in advance. This fixes 5 OVERRUN issues reported
- CVE-2024-46817Sep 27, 2024affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 [Why] Coverity reports OVERRUN warning. Should abort amdgpu_dm initialize. [How] Return failure to amdgpu_dm_init.
- CVE-2024-46816Sep 27, 2024affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links [Why] Coverity report OVERRUN warning. There are only max_links elements within dc->links. link count could up to AMDGPU_DM_MAX_D
- CVE-2024-46814Sep 27, 2024affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check msg_id before processing transcation [WHY & HOW] HDCP_MESSAGE_ID_INVALID (-1) is not a valid msg_id nor is it a valid array index, and it needs checking before used. This fixes 4 OVERRUN
- CVE-2022-48945Sep 23, 2024affected < 5.3.18-150300.59.179.1.150300.18.105.2fixed 5.3.18-150300.59.179.1.150300.18.105.2
In the Linux kernel, the following vulnerability has been resolved: media: vivid: fix compose size exceed boundary syzkaller found a bug: BUG: unable to handle page fault for address: ffffc9000a3b1000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not
- CVE-2024-46800Sep 18, 2024affected < 5.3.18-150300.59.211.1.150300.18.126.1fixed 5.3.18-150300.59.211.1.150300.18.126.1
In the Linux kernel, the following vulnerability has been resolved: sch/netem: fix use after free in netem_dequeue If netem_dequeue() enqueues packet to inner qdisc and that qdisc returns __NET_XMIT_STOLEN. The packet is dropped but qdisc_tree_reduce_backlog() is not called to
- CVE-2024-46774Sep 18, 2024affected < 5.3.18-150300.59.179.1.150300.18.105.2fixed 5.3.18-150300.59.179.1.150300.18.105.2
In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() Smatch warns: arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() warn: potential spectre issue 'args.args' [r] (local cap) The 'nargs' and '
- CVE-2024-46695Sep 13, 2024affected < 5.3.18-150300.59.179.1.150300.18.105.2fixed 5.3.18-150300.59.179.1.150300.18.105.2
In the Linux kernel, the following vulnerability has been resolved: selinux,smack: don't bypass permissions check in inode_setsecctx hook Marek Gresko reports that the root user on an NFS client is able to change the security labels on files on an NFS filesystem that is exporte
- affected < 5.3.18-150300.59.182.1.150300.18.107.1fixed 5.3.18-150300.59.182.1.150300.18.107.1
In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free.
Page 39 of 85