VYPR

rpm package

suse/kernel-default-base&distro=SUSE Linux Micro 6.1

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Micro%206.1

Vulnerabilities (3,141)

  • CVE-2024-26864Apr 17, 2024
    affected < 6.4.0-24.1.21.4fixed 6.4.0-24.1.21.4

    In the Linux kernel, the following vulnerability has been resolved: tcp: Fix refcnt handling in __inet_hash_connect(). syzbot reported a warning in sk_nulls_del_node_init_rcu(). The commit 66b60b0c8c4a ("dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalbli

  • CVE-2024-26831Apr 17, 2024
    affected < 6.4.0-31.1.21.9fixed 6.4.0-31.1.21.9

    In the Linux kernel, the following vulnerability has been resolved: net/handshake: Fix handshake_req_destroy_test1 Recently, handshake_req_destroy_test1 started failing: Expected handshake_req_destroy_test == req, but handshake_req_destroy_test == 0000000000000000 req

  • CVE-2024-26810MedApr 5, 2024
    affected < 6.4.0-28.1.21.6fixed 6.4.0-28.1.21.6

    In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Lock external INTx masking ops Mask operations through config space changes to DisINTx may race INTx configuration changes via ioctl. Create wrappers that add locking for paths outside of the core in

  • CVE-2024-26782Apr 4, 2024
    affected < 6.4.0-24.1.21.4fixed 6.4.0-24.1.21.4

    In the Linux kernel, the following vulnerability has been resolved: mptcp: fix double-free on socket dismantle when MPTCP server accepts an incoming connection, it clones its listener socket. However, the pointer to 'inet_opt' for the new socket has the same value as the origin

  • CVE-2024-26767Apr 3, 2024
    affected < 6.4.0-24.1.21.4fixed 6.4.0-24.1.21.4

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fixed integer types and null check locations [why]: issues fixed: - comparison with wider integer type in loop condition which can cause infinite loops - pointer dereference before null check

  • CVE-2024-26761Apr 3, 2024
    affected < 6.4.0-24.1.21.4fixed 6.4.0-24.1.21.4

    In the Linux kernel, the following vulnerability has been resolved: cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window The Linux CXL subsystem is built on the assumption that HPA == SPA. That is, the host physical address (HPA) the HDM decoder regist

  • CVE-2024-26758Apr 3, 2024
    affected < 6.4.0-24.1.21.4fixed 6.4.0-24.1.21.4

    In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore suspended array in md_check_recovery() mddev_suspend() never stop sync_thread, hence it doesn't make sense to ignore suspended array in md_check_recovery(), which might cause sync_thread can't

  • CVE-2024-26741Apr 3, 2024
    affected < 6.4.0-24.1.21.4fixed 6.4.0-24.1.21.4

    In the Linux kernel, the following vulnerability has been resolved: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished(). syzkaller reported a warning [0] in inet_csk_destroy_sock() with no repro. WARN_ON(inet_sk(sk)->inet_num && !inet_csk(sk)->ics

  • CVE-2024-26708Apr 3, 2024
    affected < 6.4.0-28.1.21.6fixed 6.4.0-28.1.21.6

    In the Linux kernel, the following vulnerability has been resolved: mptcp: really cope with fastopen race Fastopen and PM-trigger subflow shutdown can race, as reported by syzkaller. In my first attempt to close such race, I missed the fact that the subflow status can change a

  • CVE-2024-26703Apr 3, 2024
    affected < 6.4.0-24.1.21.4fixed 6.4.0-24.1.21.4

    In the Linux kernel, the following vulnerability has been resolved: tracing/timerlat: Move hrtimer_init to timerlat_fd open() Currently, the timerlat's hrtimer is initialized at the first read of timerlat_fd, and destroyed at close(). It works, but it causes an error if the use

  • CVE-2024-26661Apr 2, 2024
    affected < 6.4.0-34.1.21.11fixed 6.4.0-34.1.21.11

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' In "u32 otg_inst = pipe_ctx->stream_res.tg->inst;" pipe_ctx->stream_res.tg could be NULL, it is relying on the caller to ensure the tg

  • CVE-2024-26634Mar 18, 2024
    affected < 6.4.0-28.1.21.6fixed 6.4.0-28.1.21.6

    In the Linux kernel, the following vulnerability has been resolved: net: fix removing a namespace with conflicting altnames Mark reports a BUG() when a net namespace is removed. kernel BUG at net/core/dev.c:11520! Physical interfaces moved outside of init_net get "refunde

  • CVE-2024-26596MedFeb 23, 2024
    affected < 6.4.0-24.1.21.4fixed 6.4.0-24.1.21.4

    In the Linux kernel, the following vulnerability has been resolved: net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events After the blamed commit, we started doing this dereference for every NETDEV_CHANGEUPPER and NETDEV_PRECHANGEUPPER event in the sy

  • CVE-2024-26584Feb 21, 2024
    affected < 6.4.0-35.1.21.12fixed 6.4.0-35.1.21.12

    In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our requests to the crypto API, crypto_aead_{encrypt,decrypt} can return -EBUSY instead of -EINPROGRES

  • CVE-2023-39197Jan 23, 2024
    affected < 6.4.0-35.1.21.12fixed 6.4.0-35.1.21.12

    An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.

  • CVE-2023-6270Jan 4, 2024
    affected < 6.4.0-24.1.21.4fixed 6.4.0-24.1.21.4

    A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` glob

  • CVE-2023-42752Oct 13, 2023
    affected < 6.4.0-39.1.21.16fixed 6.4.0-39.1.21.16

    An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.

  • CVE-2023-42753Sep 25, 2023
    affected < 6.4.0-35.1.21.12fixed 6.4.0-35.1.21.12

    An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This iss

  • CVE-2023-3772Jul 25, 2023
    affected < 6.4.0-35.1.21.12fixed 6.4.0-35.1.21.12

    A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of s

  • CVE-2023-31248Jul 5, 2023
    affected < 6.4.0-35.1.21.12fixed 6.4.0-35.1.21.12

    Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace

Page 157 of 158