VYPR

rpm package

suse/kernel-docs&distro=SUSE Linux Enterprise Server 15 SP3-LTSS

pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS

Vulnerabilities (1,483)

  • CVE-2021-47562May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: ice: fix vsi->txq_map sizing The approach of having XDP queue per CPU regardless of user's setting exposed a hidden bug that could occur in case when Rx queue count differ from Tx queue count. Currently vsi->tx

  • CVE-2021-47557May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_ets: don't peek at classes beyond 'nbands' when the number of DRR classes decreases, the round-robin active list can contain elements that have already been freed in ets_qdisc_change(). As a cons

  • CVE-2021-47549May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl When the `rmmod sata_fsl.ko` command is executed in the PPC64 GNU/Linux, a bug is reported: =========================================================

  • CVE-2021-47542May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() In qlcnic_83xx_add_rings(), the indirect function of ahw->hw_ops->alloc_mbx_args will be called to allocate memory for cmd.req.arg,

  • CVE-2021-47541May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() In mlx4_en_try_alloc_resources(), mlx4_en_copy_priv() is called and tmp->tx_cq will be freed on the error path of mlx4_en_copy_priv(). Aft

  • CVE-2021-47540May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode Fix the following NULL pointer dereference in mt7915_get_phy_mode routine adding an ibss interface to the mt7915 driver. [ 101.137097] wlan0:

  • CVE-2021-47538May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() Need to call rxrpc_put_local() for peer candidate before kfree() as it holds a ref to rxrpc_local. [DH: v2: Changed to abstract the peer freeing code out into

  • CVE-2021-47536May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: net/smc: fix wrong list_del in smc_lgr_cleanup_early smc_lgr_cleanup_early() meant to delete the link group from the link group list, but it deleted the list head by mistake. This may cause memory corruption s

  • CVE-2021-47535May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm/a6xx: Allocate enough space for GMU registers In commit 142639a52a01 ("drm/msm/a6xx: fix crashstate capture for A650") we changed a6xx_get_gmu_registers() to read 3 sets of registers. Unfortunately, we

  • CVE-2021-47523May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr This buffer is currently allocated in hfi1_init(): if (reinit) ret = init_after_reset(dd); else ret = loadtime_init(dd); if (ret) goto done; /* allocate

  • CVE-2021-47522May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: HID: bigbenff: prevent null pointer dereference When emulating the device through uhid, there is a chance we don't have output reports and so report_field is null.

  • CVE-2021-47521May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: can: sja1000: fix use after free in ems_pcmcia_add_card() If the last channel is not available then "dev" is freed. Fortunately, we can just use "pdev->irq" instead. Also we should check if at least one chann

  • CVE-2021-47520May 24, 2024
    affected < 5.3.18-150300.59.170.2fixed 5.3.18-150300.59.170.2

    In the Linux kernel, the following vulnerability has been resolved: can: pch_can: pch_can_rx_normal: fix use after free After calling netif_receive_skb(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is dereferenced just after the call n

  • CVE-2021-47518May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done The done() netlink callback nfc_genl_dump_ses_done() should check if received argument is non-NULL, because its allocation could fail earlier in d

  • CVE-2021-47516May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: nfp: Fix memory leak in nfp_cpp_area_cache_add() In line 800 (#1), nfp_cpp_area_alloc() allocates and initializes a CPP area structure. But in line 807 (#2), when the cache is allocated failed, this CPP area st

  • CVE-2021-47512May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: fq_pie: prevent dismantle issue For some reason, fq_pie_destroy() did not copy working code from pie_destroy() and other qdiscs, thus causing elusive bug. Before calling del_timer_sync(&q->adapt_tim

  • CVE-2021-47511May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: oss: Fix negative period/buffer sizes The period size calculation in OSS layer may receive a negative value as an error, but the code there assumes only the positive values and handle them with size_

  • CVE-2021-47509May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: oss: Limit the period size to 16MB Set the practical limit to the period size (the fragment shift in OSS) instead of a full 31bit; a too large value could lead to the exhaust of memory as we allocate

  • CVE-2021-47507May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: nfsd: Fix nsfd startup race (again) Commit bd5ae9288d64 ("nfsd: register pernet ops last, unregister first") has re-opened rpc_pipefs_event() race against nfsd_net_id registration (register_pernet_subsys()) whi

  • CVE-2021-47506May 24, 2024
    affected < 5.3.18-150300.59.164.1fixed 5.3.18-150300.59.164.1

    In the Linux kernel, the following vulnerability has been resolved: nfsd: fix use-after-free due to delegation race A delegation break could arrive as soon as we've called vfs_setlease. A delegation break runs a callback which immediately (in nfsd4_cb_recall_prepare) adds the

Page 41 of 75