VYPR

rpm package

suse/kernel-default-base&distro=SUSE Manager Proxy 4.3

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Manager%20Proxy%204.3

Vulnerabilities (1,907)

  • CVE-2022-48968Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential memory leak in otx2_init_tc() In otx2_init_tc(), if rhashtable_init() failed, it does not free tc->tc_entries_bitmap which is allocated in otx2_tc_alloc_ent_bitmap().

  • CVE-2022-48967Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: NFC: nci: Bounds check struct nfc_target arrays While running under CONFIG_FORTIFY_SOURCE=y, syzkaller reported: memcpy: detected field-spanning write (size 129) of single field "target->sensf_res" at net/nf

  • CVE-2022-48962Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() The skb is delivered to napi_gro_receive() which may free it, after calling this, dereferencing skb may trigger use-after-free.

  • CVE-2022-48961Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: net: mdio: fix unbalanced fwnode reference count in mdio_device_release() There is warning report about of_node refcount leak while probing mdio device: OF: ERROR: memory leak, expected refcount 1 instead of 2

  • CVE-2022-48960Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() The skb is delivered to napi_gro_receive() which may free it, after calling this, dereferencing skb may trigger use-after-free.

  • CVE-2022-48959Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() When dsa_devlink_region_create failed in sja1105_setup_devlink_regions(), priv->regions is not released.

  • CVE-2022-48956Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: ipv6: avoid use-after-free in ip6_fragment() Blamed commit claimed rcu_read_lock() was held by ip6_fragment() callers. It seems to not be always true, at least for UDP stack. syzbot reported: BUG: KASAN: use

  • CVE-2022-48955Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: net: thunderbolt: fix memory leak in tbnet_open() When tb_ring_alloc_rx() failed in tbnet_open(), ida that allocated in tb_xdomain_alloc_out_hopid() is not released. Add tb_xdomain_release_out_hopid() to the er

  • CVE-2022-48954Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: s390/qeth: fix use-after-free in hsci KASAN found that addr was dereferenced after br2dev_event_work was freed. ================================================================== BUG: KASAN: use-after-free in

  • CVE-2022-48953Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: rtc: cmos: Fix event handler registration ordering issue Because acpi_install_fixed_event_handler() enables the event automatically on success, it is incorrect to call it before the handler routine passed to it

  • CVE-2022-48951Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx() The bounds checks in snd_soc_put_volsw_sx() are only being applied to the first channel, meaning it is possible to write out of bounds values

  • CVE-2022-48949Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: igb: Initialize mailbox message for VF reset When a MAC address is not assigned to the VF, that portion of the message sent to the VF is not set. The memory, however, is allocated from the stack meaning that in

  • CVE-2022-48948Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT t

  • CVE-2022-48947Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix u8 overflow By keep sending L2CAP_CONF_REQ packets, chan->num_conf_rsp increases multiple times and eventually it will wrap around the maximum number (i.e., 255). This patch prevents this

  • CVE-2022-48946Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: udf: Fix preallocation discarding at indirect extent boundary When preallocation extent is the first one in the extent block, the code would corrupt extent tree header instead. Fix the problem and use udf_delet

  • CVE-2024-50047Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: smb: client: fix UAF in async decryption Doing an async decryption (large read) crashes with a slab-use-after-free way down in the crypto API. Reproducer: # mount.cifs -o ...,seal,esize=1 //srv/share /mnt

  • CVE-2024-50017Oct 21, 2024
    affected < 5.14.21-150400.24.144.1.150400.24.70.1fixed 5.14.21-150400.24.144.1.150400.24.70.1

    In the Linux kernel, the following vulnerability has been resolved: x86/mm/ident_map: Use gbpages only where full GB page should be mapped. When ident_pud_init() uses only GB pages to create identity maps, large ranges of addresses not actually requested can be included in the

  • CVE-2024-49930HigOct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix array out-of-bound access in SoC stats Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx() functi

  • CVE-2024-49991Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer Pass pointer reference to amdgpu_bo_unref to clear the correct pointer, otherwise amdgpu_bo_unref clear the local variable, the original pointer not set

  • CVE-2024-49982Oct 21, 2024
    affected < 5.14.21-150400.24.141.1.150400.24.68.2fixed 5.14.21-150400.24.141.1.150400.24.68.2

    In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in more places For fixing CVE-2023-6270, f98364e92662 ("aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts") makes tx() calling dev_put() instead of d

Page 50 of 96