rpm package
suse/kernel-default-base&distro=SUSE Manager Proxy 4.3
pkg:rpm/suse/kernel-default-base&distro=SUSE%20Manager%20Proxy%204.3
Vulnerabilities (1,907)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-35901 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | May 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix Rx DMA datasize and skb_over_panic mana_get_rxbuf_cfg() aligns the RX buffer's DMA datasize to be multiple of 64. So a packet slightly bigger than mtu+14, say 1536, can be received and cause skb_ | ||
| CVE-2024-35878 | — | < 5.14.21-150400.24.128.1.150400.24.62.1 | 5.14.21-150400.24.128.1.150400.24.62.1 | May 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: of: module: prevent NULL pointer dereference in vsnprintf() In of_modalias(), we can get passed the str and len parameters which would cause a kernel oops in vsnprintf() since it only allows passing a NULL ptr | ||
| CVE-2024-35869 | — | < 5.14.21-150400.24.125.1.150400.24.60.1 | 5.14.21-150400.24.125.1.150400.24.60.1 | May 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: smb: client: guarantee refcounted children from parent session Avoid potential use-after-free bugs when walking DFS referrals, mounting and performing DFS failover by ensuring that all children from parent @tco | ||
| CVE-2024-35868 | — | < 5.14.21-150400.24.122.2.150400.24.58.2 | 5.14.21-150400.24.122.2.150400.24.58.2 | May 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_stats_proc_write() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF. | ||
| CVE-2024-35867 | — | < 5.14.21-150400.24.122.2.150400.24.58.2 | 5.14.21-150400.24.122.2.150400.24.58.2 | May 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_stats_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF. | ||
| CVE-2024-35864 | — | < 5.14.21-150400.24.125.1.150400.24.60.1 | 5.14.21-150400.24.125.1.150400.24.60.1 | May 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF. | ||
| CVE-2024-35863 | — | < 5.14.21-150400.24.122.2.150400.24.58.2 | 5.14.21-150400.24.122.2.150400.24.58.2 | May 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF. | ||
| CVE-2024-35862 | — | < 5.14.21-150400.24.125.1.150400.24.60.1 | 5.14.21-150400.24.125.1.150400.24.60.1 | May 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_network_name_deleted() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF. | ||
| CVE-2024-35861 | — | < 5.14.21-150400.24.125.1.150400.24.60.1 | 5.14.21-150400.24.125.1.150400.24.60.1 | May 19, 2024 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF. | ||
| CVE-2024-25742 | Med | 6.5 | < 5.14.21-150400.24.116.1.150400.24.54.5 | 5.14.21-150400.24.116.1.150400.24.54.5 | May 17, 2024 | In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES. | |
| CVE-2024-35840 | — | < 5.14.21-150400.24.170.2.150400.24.86.2 | 5.14.21-150400.24.170.2.150400.24.86.2 | May 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() subflow_finish_connect() uses four fields (backup, join_id, thmac, none) that may contain garbage unless OPTION_MPTCP_MPJ_SYNACK has been set in mp | ||
| CVE-2023-52690 | — | < 5.14.21-150400.24.122.2.150400.24.58.2 | 5.14.21-150400.24.122.2.150400.24.58.2 | May 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check to scom_debug_init_one() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Add a null pointer check, and release 'ent' to av | ||
| CVE-2023-52686 | — | < 5.14.21-150400.24.122.2.150400.24.58.2 | 5.14.21-150400.24.122.2.150400.24.58.2 | May 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check in opal_event_init() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. | ||
| CVE-2023-52676 | — | < 5.14.21-150400.24.122.2.150400.24.58.2 | 5.14.21-150400.24.122.2.150400.24.58.2 | May 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: bpf: Guard stack limits against 32bit overflow This patch promotes the arithmetic around checking stack bounds to be done in the 64-bit domain, instead of the current 32bit. The arithmetic implies adding togeth | ||
| CVE-2024-35815 | Med | 5.5 | < 5.14.21-150400.24.122.2.150400.24.58.2 | 5.14.21-150400.24.122.2.150400.24.58.2 | May 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion The first kiocb_set_cancel_fn() argument may point at a struct kiocb that is not embedded inside struct aio_kiocb. With the current code, dependi | |
| CVE-2024-35811 | Med | 5.5 | < 5.14.21-150400.24.122.2.150400.24.58.2 | 5.14.21-150400.24.122.2.150400.24.58.2 | May 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach This is the candidate patch of CVE-2023-47233 : https://nvd.nist.gov/vuln/detail/CVE-2023-47233 In brcm80211 driver,it starts with the following | |
| CVE-2023-52670 | — | < 5.14.21-150400.24.125.1.150400.24.60.1 | 5.14.21-150400.24.125.1.150400.24.60.1 | May 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: rpmsg: virtio: Free driver_override when rpmsg_remove() Free driver_override when rpmsg_remove(), otherwise the following memory leak will occur: unreferenced object 0xffff0000d55d7080 (size 128): comm "kwor | ||
| CVE-2024-35817 | — | < 5.14.21-150400.24.122.2.150400.24.58.2 | 5.14.21-150400.24.122.2.150400.24.58.2 | May 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid | ||
| CVE-2024-35789 | Hig | 7.8 | < 5.14.21-150400.24.125.1.150400.24.60.1 | 5.14.21-150400.24.125.1.150400.24.60.1 | May 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes When moving a station out of a VLAN and deleting the VLAN afterwards, the fast_rx entry still holds a pointer to the VLAN's netdev, which can c | |
| CVE-2024-27413 | — | < 5.14.21-150400.24.122.2.150400.24.58.2 | 5.14.21-150400.24.122.2.150400.24.58.2 | May 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: efi/capsule-loader: fix incorrect allocation size gcc-14 notices that the allocation with sizeof(void) on 32-bit architectures is not enough for a 64-bit phys_addr_t: drivers/firmware/efi/capsule-loader.c: In |
- CVE-2024-35901May 19, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix Rx DMA datasize and skb_over_panic mana_get_rxbuf_cfg() aligns the RX buffer's DMA datasize to be multiple of 64. So a packet slightly bigger than mtu+14, say 1536, can be received and cause skb_
- CVE-2024-35878May 19, 2024affected < 5.14.21-150400.24.128.1.150400.24.62.1fixed 5.14.21-150400.24.128.1.150400.24.62.1
In the Linux kernel, the following vulnerability has been resolved: of: module: prevent NULL pointer dereference in vsnprintf() In of_modalias(), we can get passed the str and len parameters which would cause a kernel oops in vsnprintf() since it only allows passing a NULL ptr
- CVE-2024-35869May 19, 2024affected < 5.14.21-150400.24.125.1.150400.24.60.1fixed 5.14.21-150400.24.125.1.150400.24.60.1
In the Linux kernel, the following vulnerability has been resolved: smb: client: guarantee refcounted children from parent session Avoid potential use-after-free bugs when walking DFS referrals, mounting and performing DFS failover by ensuring that all children from parent @tco
- CVE-2024-35868May 19, 2024affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_stats_proc_write() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
- CVE-2024-35867May 19, 2024affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_stats_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
- CVE-2024-35864May 19, 2024affected < 5.14.21-150400.24.125.1.150400.24.60.1fixed 5.14.21-150400.24.125.1.150400.24.60.1
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
- CVE-2024-35863May 19, 2024affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
- CVE-2024-35862May 19, 2024affected < 5.14.21-150400.24.125.1.150400.24.60.1fixed 5.14.21-150400.24.125.1.150400.24.60.1
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_network_name_deleted() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
- CVE-2024-35861May 19, 2024affected < 5.14.21-150400.24.125.1.150400.24.60.1fixed 5.14.21-150400.24.125.1.150400.24.60.1
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
- affected < 5.14.21-150400.24.116.1.150400.24.54.5fixed 5.14.21-150400.24.116.1.150400.24.54.5
In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES.
- CVE-2024-35840May 17, 2024affected < 5.14.21-150400.24.170.2.150400.24.86.2fixed 5.14.21-150400.24.170.2.150400.24.86.2
In the Linux kernel, the following vulnerability has been resolved: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() subflow_finish_connect() uses four fields (backup, join_id, thmac, none) that may contain garbage unless OPTION_MPTCP_MPJ_SYNACK has been set in mp
- CVE-2023-52690May 17, 2024affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2
In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check to scom_debug_init_one() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Add a null pointer check, and release 'ent' to av
- CVE-2023-52686May 17, 2024affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2
In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check in opal_event_init() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.
- CVE-2023-52676May 17, 2024affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2
In the Linux kernel, the following vulnerability has been resolved: bpf: Guard stack limits against 32bit overflow This patch promotes the arithmetic around checking stack bounds to be done in the 64-bit domain, instead of the current 32bit. The arithmetic implies adding togeth
- affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2
In the Linux kernel, the following vulnerability has been resolved: fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion The first kiocb_set_cancel_fn() argument may point at a struct kiocb that is not embedded inside struct aio_kiocb. With the current code, dependi
- affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach This is the candidate patch of CVE-2023-47233 : https://nvd.nist.gov/vuln/detail/CVE-2023-47233 In brcm80211 driver,it starts with the following
- CVE-2023-52670May 17, 2024affected < 5.14.21-150400.24.125.1.150400.24.60.1fixed 5.14.21-150400.24.125.1.150400.24.60.1
In the Linux kernel, the following vulnerability has been resolved: rpmsg: virtio: Free driver_override when rpmsg_remove() Free driver_override when rpmsg_remove(), otherwise the following memory leak will occur: unreferenced object 0xffff0000d55d7080 (size 128): comm "kwor
- CVE-2024-35817May 17, 2024affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid
- affected < 5.14.21-150400.24.125.1.150400.24.60.1fixed 5.14.21-150400.24.125.1.150400.24.60.1
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes When moving a station out of a VLAN and deleting the VLAN afterwards, the fast_rx entry still holds a pointer to the VLAN's netdev, which can c
- CVE-2024-27413May 17, 2024affected < 5.14.21-150400.24.122.2.150400.24.58.2fixed 5.14.21-150400.24.122.2.150400.24.58.2
In the Linux kernel, the following vulnerability has been resolved: efi/capsule-loader: fix incorrect allocation size gcc-14 notices that the allocation with sizeof(void) on 32-bit architectures is not enough for a 64-bit phys_addr_t: drivers/firmware/efi/capsule-loader.c: In
Page 79 of 96