VYPR

rpm package

suse/kernel-docs&distro=SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS

pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSS

Vulnerabilities (2,830)

  • CVE-2024-26921Apr 18, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and other functions can pass skb->sk as function argument. If the skb is a fragment and reassembly happens before such function call retu

  • CVE-2024-26903MedApr 17, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security During our fuzz testing of the connection and disconnection process at the RFCOMM layer, we discovered this bug. By comparing the packets from a no

  • CVE-2024-26898HigApr 17, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts This patch is against CVE-2023-6270. The description of cve is: A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel.

  • CVE-2024-26852HigApr 17, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") w

  • CVE-2024-26862Apr 17, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: packet: annotate data-races around ignore_outgoing ignore_outgoing is read locklessly from dev_queue_xmit_nit() and packet_getsockopt() Add appropriate READ_ONCE()/WRITE_ONCE() annotations. syzbot reported:

  • CVE-2024-26840Apr 17, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix memory leak in cachefiles_add_cache() The following memory leak was reported after unbinding /dev/cachefiles: ================================================================== unreferenced obj

  • CVE-2024-26832Apr 17, 2024
    affected < 5.14.21-150400.24.194.1fixed 5.14.21-150400.24.194.1

    In the Linux kernel, the following vulnerability has been resolved: mm: zswap: fix missing folio cleanup in writeback race path In zswap_writeback_entry(), after we get a folio from __read_swap_cache_async(), we grab the tree lock again to check that the swap entry was not inva

  • CVE-2024-26828Apr 17, 2024
    affected < 5.14.21-150400.24.122.2fixed 5.14.21-150400.24.122.2

    In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "b

  • CVE-2021-47219Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() The following issue was observed running syzkaller: BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline] BUG: KASAN: slab

  • CVE-2021-47218Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: selinux: fix NULL-pointer dereference when hashtab allocation fails When the hash table slot array allocation fails in hashtab_init(), h->size is left initialized with a non-zero value, but the h->htable pointe

  • CVE-2021-47217Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails Check for a valid hv_vp_index array prior to derefencing hv_vp_index when setting Hyper-V's TSC change callback. If Hyper-V setup fail

  • CVE-2021-47216Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: advansys: Fix kernel pointer leak Pointers should be printed with %p or %px rather than cast to 'unsigned long' and printed with %lx. Change %lx to %p to print the hashed pointer.

  • CVE-2021-47215Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: kTLS, Fix crash in RX resync flow For the TLS RX resync flow, we maintain a list of TLS contexts that require some attention, to communicate their resync information to the HW. Here we fix list corru

  • CVE-2021-47212Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Update error handler for UCTX and UMEM In the fast unload flow, the device state is set to internal error, which indicates that the driver started the destroy process. In this case, when a destroy com

  • CVE-2021-47211Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: fix null pointer dereference on pointer cs_desc The pointer cs_desc return from snd_usb_find_clock_source could be null, so there is a potential null pointer dereference issue. Fix this by addi

  • CVE-2021-47210Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read Calling tps6598x_block_read with a higher than allowed len can be handled by just returning an error. There's no need to crash systems with panic-on-warn

  • CVE-2021-47209Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: sched/fair: Prevent dead task groups from regaining cfs_rq's Kevin is reporting crashes which point to a use-after-free of a cfs_rq in update_blocked_averages(). Initial debugging revealed that we've live cfs_r

  • CVE-2021-47207Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: gus: fix null pointer dereference on pointer block The pointer block return from snd_gf1_dma_next_block could be null, so there is a potential null pointer dereference issue. Fix this by adding a null che

  • CVE-2021-47206Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: usb: host: ohci-tmio: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.

  • CVE-2021-47205Apr 10, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: Unregister clocks/resets when unbinding Currently, unbinding a CCU driver unmaps the device's MMIO region, while leaving its clocks/resets and their providers registered. This can cause a page fa

Page 128 of 142