VYPR

rpm package

suse/kernel-default-base&distro=SUSE Linux Enterprise Micro 5.4

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.4

Vulnerabilities (2,957)

  • CVE-2022-49011Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decremen

  • CVE-2022-49010Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Check for null before removing sysfs attrs If coretemp_add_core() gets an error then pdata->core_data[indx] is already NULL and has been kfreed. Don't pass that to sysfs_remove_group() as that

  • CVE-2022-49007Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() Syzbot reported a null-ptr-deref bug: NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds

  • CVE-2022-49006Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: tracing: Free buffers when a used dynamic event is removed After 65536 dynamic events have been added and removed, the "type" field of the event then uses the first type number that is available (not currently

  • CVE-2022-49005Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Fix bounds check for _sx controls For _sx controls the semantics of the max field is not the usual one, max is the number of steps rather than the maximum value. This means that our check in snd_soc_

  • CVE-2022-49003Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: nvme: fix SRCU protection of nvme_ns_head list Walking the nvme_ns_head siblings list is protected by the head's srcu in nvme_ns_head_submit_bio() but not nvme_mpath_revalidate_paths(). Removing namespaces from

  • CVE-2022-49002Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the re

  • CVE-2022-49000Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix PCI device refcount leak in has_external_pci() for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the retur

  • CVE-2022-48999Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference Gwangun Jung reported a slab-out-of-bounds access in fib_nh_match: fib_nh_match+0xf98/0x1130 linux-6.0-rc7/net/ipv4/fib_

  • CVE-2022-48997Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: char: tpm: Protect tpm_pm_suspend with locks Currently tpm transactions are executed unconditionally in tpm_pm_suspend() function, which may lead to races with other tpm accessors in the system. Specifically,

  • CVE-2022-48995Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() There is a kmemleak when test the raydium_i2c_ts with bpf mock device: unreferenced object 0xffff88812d3675a0 (size 8): comm "python3", pid 3

  • CVE-2022-48994Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated against the expected function poin

  • CVE-2022-48992Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: Add NULL check in BE reparenting Add NULL check in dpcm_be_reparent API, to handle kernel NULL pointer dereference error. The issue occurred in fuzzing test.

  • CVE-2022-48991Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths Any codepath that zaps page table entries must invoke MMU notifiers to ensure that secondary MMUs (like KVM) don't keep accessing pages which are

  • CVE-2022-48988Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: memcg: fix possible use-after-free in memcg_write_event_control() memcg_write_event_control() accesses the dentry->d_name of the specified control fd to route the write call. As a cgroup interface file can't b

  • CVE-2022-48987Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: media: v4l2-dv-timings.c: fix too strict blanking sanity checks Sanity checks were added to verify the v4l2_bt_timings blanking fields in order to avoid integer overflows when userspace passes weird values. Bu

  • CVE-2022-48985Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix race on per-CQ variable napi work_done After calling napi_complete_done(), the NAPIF_STATE_SCHED bit may be cleared, and another CPU can start napi thread and access per-CQ variable, cq->work_don

  • CVE-2022-48981Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: drm/shmem-helper: Remove errant put in error path drm_gem_shmem_mmap() doesn't own this reference, resulting in the GEM object getting prematurely freed leading to a later use-after-free.

  • CVE-2022-48978Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: HID: core: fix shift-out-of-bounds in hid_report_raw_event Syzbot reported shift-out-of-bounds in hid_report_raw_event. microsoft 0003:045E:07DA.0001: hid_field_extract() called with n (128) > 32! (swapper/0)

  • CVE-2022-48977Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: can: af_can: fix NULL pointer dereference in can_rcv_filter Analogue to commit 8aa59e355949 ("can: af_can: fix NULL pointer dereference in can_rx_register()") we need to check for a missing initialization of ml

Page 94 of 148