VYPR

rpm package

suse/kernel-docs&distro=SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS

pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSS

Vulnerabilities (2,830)

  • CVE-2021-47379May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd KASAN reports a use-after-free report when doing fuzz test: [693354.104835] ================================================================

  • CVE-2021-47378May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: nvme-rdma: destroy cm id before destroy qp to avoid use after free We should always destroy cm_id before destroy qp to avoid to get cma event after qp was destroyed, which may lead to use after free. In RDMA co

  • CVE-2021-47376May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: bpf: Add oversize check before call kvcalloc() Commit 7661809d493b ("mm: don't allow oversized kvmalloc() calls") add the oversize check. When the allocation is larger than what kmalloc() supports, the followin

  • CVE-2021-47375May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: blktrace: Fix uaf in blk_trace access after removing by sysfs There is an use-after-free problem triggered by following process: P1(sda) P2(sdb) echo 0 > /sys/block/sdb/trace/enable blk_trace_

  • CVE-2021-47374May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: dma-debug: prevent an error message from causing runtime problems For some drivers, that use the DMA API. This error message can be reached several millions of times per second, causing spam to the kernel's pri

  • CVE-2021-47373May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Fix potential VPE leak on error In its_vpe_irq_domain_alloc, when its_vpe_init() returns an error, there is an off-by-one in the number of VPEs to be freed. Fix it by simply passing the num

  • CVE-2021-47372May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: net: macb: fix use after free on rmmod plat_dev->dev->platform_data is released by platform_device_unregister(), use of pclk and hclk is a use-after-free. Since device unregister won't need a clk device we adju

  • CVE-2021-47371May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: nexthop: Fix memory leaks in nexthop notification chain listeners syzkaller discovered memory leaks [1] that can be reduced to the following commands: # ip nexthop add id 1 blackhole # devlink dev reload pci

  • CVE-2021-47370May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure tx skbs always have the MPTCP ext Due to signed/unsigned comparison, the expression: info->size_goal - skb->len > 0 evaluates to true when the size goal is smaller than the skb size. That resul

  • CVE-2021-47369May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: s390/qeth: fix NULL deref in qeth_clear_working_pool_list() When qeth_set_online() calls qeth_clear_working_pool_list() to roll back after an error exit from qeth_hardsetup_card(), we are at risk of accessing c

  • CVE-2021-47368May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: enetc: Fix illegal access when reading affinity_hint irq_set_affinity_hit() stores a reference to the cpumask_t parameter in the irq descriptor, and that reference can be accessed later from irq_affinity_hint_p

  • CVE-2021-47367May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: virtio-net: fix pages leaking when building skb in big mode We try to use build_skb() if we had sufficient tailroom. But we forget to release the unused pages chained via private in big mode which will leak pag

  • CVE-2021-47366May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server AFS-3 has two data fetch RPC variants, FS.FetchData and FS.FetchData64, and Linux's afs client switches between them when talking to a non-YFS s

  • CVE-2021-47365May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: afs: Fix page leak There's a loop in afs_extend_writeback() that adds extra pages to a write we want to make to improve the efficiency of the writeback by making it larger. This loop stops, however, if we hit

  • CVE-2021-47364May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: comedi: Fix memory leak in compat_insnlist() `compat_insnlist()` handles the 32-bit version of the `COMEDI_INSNLIST` ioctl (whenwhen `CONFIG_COMPAT` is enabled). It allocates memory to temporarily hold an arra

  • CVE-2021-47363May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: nexthop: Fix division by zero while replacing a resilient group The resilient nexthop group torture tests in fib_nexthop.sh exposed a possible division by zero while replacing a resilient group [1]. The divisio

  • CVE-2021-47362May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Update intermediate power state for SI Update the current state as boot state during dpm initialization. During the subsequent initialization, set_power_state gets called to transition to the final

  • CVE-2021-47361May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: mcb: fix error handling in mcb_alloc_bus() There are two bugs: 1) If ida_simple_get() fails then this code calls put_device(carrier) but we haven't yet called get_device(carrier) and probably that leads t

  • CVE-2021-47360May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: binder: make sure fd closes complete During BC_FREE_BUFFER processing, the BINDER_TYPE_FDA object cleanup may close 1 or more fds. The close operations are completed using the task work mechanism -- which means

  • CVE-2021-47359May 21, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: cifs: Fix soft lockup during fsstress Below traces are observed during fsstress and system got hung. [ 130.698396] watchdog: BUG: soft lockup - CPU#6 stuck for 26s!

Page 123 of 142