rpm package
suse/kernel-default-base&distro=SUSE Linux Enterprise Micro 5.4
pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.4
Vulnerabilities (2,957)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-50128 | — | < 5.14.21-150400.24.153.1.150400.24.76.1 | 5.14.21-150400.24.153.1.150400.24.76.1 | Nov 5, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: wwan: fix global oob in wwan_rtnl_policy The variable wwan_rtnl_link_ops assign a *bigger* maxtype which leads to a global out-of-bounds read when parsing the netlink attributes. Exactly same bug cause as | ||
| CVE-2024-50125 | — | < 5.14.21-150400.24.144.1.150400.24.70.1 | 5.14.21-150400.24.144.1.150400.24.70.1 | Nov 5, 2024 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix UAF on sco_sock_timeout conn->sk maybe have been unlinked/freed while waiting for sco_conn_lock so this checks if the conn->sk is still valid by checking if it part of sco_sk_list. | ||
| CVE-2024-50115 | — | < 5.14.21-150400.24.144.1.150400.24.70.1 | 5.14.21-150400.24.144.1.150400.24.70.1 | Nov 5, 2024 | In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforc | ||
| CVE-2023-52919 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 22, 2024 | In the Linux kernel, the following vulnerability has been resolved: nfc: nci: fix possible NULL pointer dereference in send_acknowledge() Handle memory allocation failure from nci_skb_alloc() (calling alloc_skb()) to avoid possible NULL pointer dereference. | ||
| CVE-2022-49032 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw KASAN report out-of-bounds read as follows: BUG: KASAN: global-out-of-bounds in afe4404_read_raw+0x2ce/0x380 Read of size 4 at addr ffffffffc00e46 | ||
| CVE-2022-49031 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: iio: health: afe4403: Fix oob read in afe4403_read_raw KASAN report out-of-bounds read as follows: BUG: KASAN: global-out-of-bounds in afe4403_read_raw+0x42e/0x4c0 Read of size 4 at addr ffffffffc02ac638 by ta | ||
| CVE-2022-49029 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails Smatch report warning as follows: drivers/hwmon/ibmpex.c:509 ibmpex_register_bmc() warn: '&data->list' not removed from list If ibmpex_find_ | ||
| CVE-2022-49028 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: ixgbevf: Fix resource leak in ixgbevf_init_module() ixgbevf_init_module() won't destroy the workqueue created by create_singlethread_workqueue() when pci_register_driver() failed. Add destroy_workqueue() in fai | ||
| CVE-2022-49027 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: iavf: Fix error handling in iavf_init_module() The iavf_init_module() won't destroy workqueue when pci_register_driver() failed. Call destroy_workqueue() when pci_register_driver() failed to prevent the resourc | ||
| CVE-2022-49026 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: e100: Fix possible use after free in e100_xmit_prepare In e100_xmit_prepare(), if we can't map the skb, then return -ENOMEM, so e100_xmit_frame() will return NETDEV_TX_BUSY and the upper layer will resend the s | ||
| CVE-2022-49025 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free when reverting termination table When having multiple dests with termination tables and second one or afterwards fails the driver reverts usage of term tables but doesn't reset the | ||
| CVE-2022-49024 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods In m_can_pci_remove() and error handling path of m_can_pci_probe(), m_can_class_free_dev() should be called to free resource allocated | ||
| CVE-2022-49023 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix buffer overflow in elem comparison For vendor elements, the code here assumes that 5 octets are present without checking. Since the element itself is already checked to fit, we only need to | ||
| CVE-2022-49022 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration Fix possible out-of-bound access in ieee80211_get_rate_duration routine as reported by the following UBSAN report: UBSAN: array-index-out-o | ||
| CVE-2022-49021 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: phy: fix null-ptr-deref while probe() failed I got a null-ptr-deref report as following when doing fault injection test: BUG: kernel NULL pointer dereference, address: 0000000000000058 Oops: 0000 [#1] PRE | ||
| CVE-2022-49019 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: ethernet: nixge: fix NULL dereference In function nixge_hw_dma_bd_release() dereference of NULL pointer priv->rx_bd_v is possible for the case of its allocation failure in nixge_hw_dma_bd_init(). Move for | ||
| CVE-2022-49016 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: mdiobus: fix unbalanced node reference count I got the following report while doing device(mscc-miim) load test with CONFIG_OF_UNITTEST and CONFIG_OF_DYNAMIC enabled: OF: ERROR: memory leak, expected re | ||
| CVE-2022-49015 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: hsr: Fix potential use-after-free The skb is delivered to netif_rx() which may free it, after calling this, dereferencing skb may trigger use-after-free. | ||
| CVE-2022-49014 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: tun: Fix use-after-free in tun_detach() syzbot reported use-after-free in tun_detach() [1]. This causes call trace like below: ================================================================== BUG: KASA | ||
| CVE-2022-49012 | — | < 5.14.21-150400.24.141.1.150400.24.68.2 | 5.14.21-150400.24.141.1.150400.24.68.2 | Oct 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: afs: Fix server->active leak in afs_put_server The atomic_read was accidentally replaced with atomic_inc_return, which prevents the server from getting cleaned up and causes rmmod to hang with a warning: C |
- CVE-2024-50128Nov 5, 2024affected < 5.14.21-150400.24.153.1.150400.24.76.1fixed 5.14.21-150400.24.153.1.150400.24.76.1
In the Linux kernel, the following vulnerability has been resolved: net: wwan: fix global oob in wwan_rtnl_policy The variable wwan_rtnl_link_ops assign a *bigger* maxtype which leads to a global out-of-bounds read when parsing the netlink attributes. Exactly same bug cause as
- CVE-2024-50125Nov 5, 2024affected < 5.14.21-150400.24.144.1.150400.24.70.1fixed 5.14.21-150400.24.144.1.150400.24.70.1
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix UAF on sco_sock_timeout conn->sk maybe have been unlinked/freed while waiting for sco_conn_lock so this checks if the conn->sk is still valid by checking if it part of sco_sk_list.
- CVE-2024-50115Nov 5, 2024affected < 5.14.21-150400.24.144.1.150400.24.70.1fixed 5.14.21-150400.24.144.1.150400.24.70.1
In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforc
- CVE-2023-52919Oct 22, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: fix possible NULL pointer dereference in send_acknowledge() Handle memory allocation failure from nci_skb_alloc() (calling alloc_skb()) to avoid possible NULL pointer dereference.
- CVE-2022-49032Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw KASAN report out-of-bounds read as follows: BUG: KASAN: global-out-of-bounds in afe4404_read_raw+0x2ce/0x380 Read of size 4 at addr ffffffffc00e46
- CVE-2022-49031Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: iio: health: afe4403: Fix oob read in afe4403_read_raw KASAN report out-of-bounds read as follows: BUG: KASAN: global-out-of-bounds in afe4403_read_raw+0x42e/0x4c0 Read of size 4 at addr ffffffffc02ac638 by ta
- CVE-2022-49029Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails Smatch report warning as follows: drivers/hwmon/ibmpex.c:509 ibmpex_register_bmc() warn: '&data->list' not removed from list If ibmpex_find_
- CVE-2022-49028Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: ixgbevf: Fix resource leak in ixgbevf_init_module() ixgbevf_init_module() won't destroy the workqueue created by create_singlethread_workqueue() when pci_register_driver() failed. Add destroy_workqueue() in fai
- CVE-2022-49027Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: iavf: Fix error handling in iavf_init_module() The iavf_init_module() won't destroy workqueue when pci_register_driver() failed. Call destroy_workqueue() when pci_register_driver() failed to prevent the resourc
- CVE-2022-49026Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: e100: Fix possible use after free in e100_xmit_prepare In e100_xmit_prepare(), if we can't map the skb, then return -ENOMEM, so e100_xmit_frame() will return NETDEV_TX_BUSY and the upper layer will resend the s
- CVE-2022-49025Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free when reverting termination table When having multiple dests with termination tables and second one or afterwards fails the driver reverts usage of term tables but doesn't reset the
- CVE-2022-49024Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods In m_can_pci_remove() and error handling path of m_can_pci_probe(), m_can_class_free_dev() should be called to free resource allocated
- CVE-2022-49023Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix buffer overflow in elem comparison For vendor elements, the code here assumes that 5 octets are present without checking. Since the element itself is already checked to fit, we only need to
- CVE-2022-49022Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration Fix possible out-of-bound access in ieee80211_get_rate_duration routine as reported by the following UBSAN report: UBSAN: array-index-out-o
- CVE-2022-49021Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: net: phy: fix null-ptr-deref while probe() failed I got a null-ptr-deref report as following when doing fault injection test: BUG: kernel NULL pointer dereference, address: 0000000000000058 Oops: 0000 [#1] PRE
- CVE-2022-49019Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: nixge: fix NULL dereference In function nixge_hw_dma_bd_release() dereference of NULL pointer priv->rx_bd_v is possible for the case of its allocation failure in nixge_hw_dma_bd_init(). Move for
- CVE-2022-49016Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: net: mdiobus: fix unbalanced node reference count I got the following report while doing device(mscc-miim) load test with CONFIG_OF_UNITTEST and CONFIG_OF_DYNAMIC enabled: OF: ERROR: memory leak, expected re
- CVE-2022-49015Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: net: hsr: Fix potential use-after-free The skb is delivered to netif_rx() which may free it, after calling this, dereferencing skb may trigger use-after-free.
- CVE-2022-49014Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: net: tun: Fix use-after-free in tun_detach() syzbot reported use-after-free in tun_detach() [1]. This causes call trace like below: ================================================================== BUG: KASA
- CVE-2022-49012Oct 21, 2024affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2
In the Linux kernel, the following vulnerability has been resolved: afs: Fix server->active leak in afs_put_server The atomic_read was accidentally replaced with atomic_inc_return, which prevents the server from getting cleaned up and causes rmmod to hang with a warning: C
Page 93 of 148