VYPR

rpm package

suse/kernel-docs&distro=SUSE Linux Enterprise Server 15 SP4-LTSS

pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS

Vulnerabilities (2,830)

  • CVE-2024-44964Sep 4, 2024
    affected < 5.14.21-150400.24.144.1fixed 5.14.21-150400.24.144.1

    In the Linux kernel, the following vulnerability has been resolved: idpf: fix memory leaks and crashes while performing a soft reset The second tagged commit introduced a UAF, as it removed restoring q_vector->vport pointers after reinitializating the structures. This is due to

  • CVE-2024-44947Sep 2, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: fuse: Initialize beyond-EOF page contents before setting uptodate fuse_notify_store(), unlike fuse_do_readpage(), does not enable page zeroing (because it can be used to change partial page contents). So fuse_

  • CVE-2024-44946Aug 31, 2024
    affected < 5.14.21-150400.24.136.1fixed 5.14.21-150400.24.136.1

    In the Linux kernel, the following vulnerability has been resolved: kcm: Serialise kcm_sendmsg() for the same socket. syzkaller reported UAF in kcm_release(). [0] The scenario is 1. Thread A builds a skb with MSG_MORE and sets kcm->seq_skb. 2. Thread A resumes building s

  • CVE-2022-48944Aug 30, 2024
    affected < 5.14.21-150400.24.136.1fixed 5.14.21-150400.24.136.1

    In the Linux kernel, the following vulnerability has been resolved: sched: Fix yet more sched_fork() races Where commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an invalid sched_task_group") fixed a fork race vs cgroup, it opened up a race vs syscalls by not placing

  • CVE-2024-44938Aug 26, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: jfs: Fix shift-out-of-bounds in dbDiscardAG When searching for the next smaller log2 block, BLKSTOL2() returned 0, causing shift exponent -1 to be negative. This patch fixes the issue by exiting the loop direc

  • CVE-2024-44932Aug 26, 2024
    affected < 5.14.21-150400.24.144.1fixed 5.14.21-150400.24.144.1

    In the Linux kernel, the following vulnerability has been resolved: idpf: fix UAFs when destroying the queues The second tagged commit started sometimes (very rarely, but possible) throwing WARNs from net/core/page_pool.c:page_pool_disable_direct_recycling(). Turned out idpf fr

  • CVE-2024-43883Aug 23, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: usb: vhci-hcd: Do not drop references before new references are gained At a few places the driver carries stale pointers to references that can still be used. Make sure that does not happen. This strictly speak

  • CVE-2022-48941Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: ice: fix concurrent reset and removal of VFs Commit c503e63200c6 ("ice: Stop processing VF messages during teardown") introduced a driver state flag, ICE_VF_DEINIT_IN_PROGRESS, which is intended to prevent some

  • CVE-2022-48938Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: CDC-NCM: avoid overflow in sanity checking A broken device may give an extreme offset like 0xFFF0 and a reasonable length for a fragment. In the sanity check as formulated now, this will create an integer overf

  • CVE-2022-48937Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: io_uring: add a schedule point in io_add_buffers() Looping ~65535 times doing kmalloc() calls can trigger soft lockups, especially with DEBUG features (like KASAN). [ 253.536212] watchdog: BUG: soft lockup -

  • CVE-2022-48935Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: unregister flowtable hooks on netns exit Unregister flowtable hooks before they are releases via nf_tables_flowtable_destroy() otherwise hook core reports UAF. BUG: KASAN: use-after-free

  • CVE-2022-48934Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() ida_simple_get() returns an id between min (0) and max (NFP_MAX_MAC_INDEX) inclusive. So NFP_MAX_MAC_INDEX (0xff) is a valid id. In order for th

  • CVE-2022-48932Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte When adding a rule with 32 destinations, we hit the following out-of-band access issue: BUG: KASAN: slab-out-of-bounds in mlx5_cmd_dr_create_fte

  • CVE-2022-48931Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: configfs: fix a race in configfs_{,un}register_subsystem() When configfs_register_subsystem() or configfs_unregister_subsystem() is executing link_group() or unlink_group(), it is possible that two processes ad

  • CVE-2022-48930Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/ib_srp: Fix a deadlock Remove the flush_workqueue(system_long_wq) call since flushing system_long_wq is deadlock-prone and since that call is redundant with a preceding cancel_work_sync()

  • CVE-2022-48929Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: Fix crash due to out of bounds access into reg2btf_ids. When commit e6ac2450d6de ("bpf: Support bpf program calling kernel function") added kfunc support, it defined reg2btf_ids as a cheap way to translate

  • CVE-2022-48928Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: iio: adc: men_z188_adc: Fix a resource leak in an error handling path If iio_device_register() fails, a previous ioremap() is left unbalanced. Update the error handling path and add the missing iounmap() call,

  • CVE-2022-48927Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: iio: adc: tsc2046: fix memory corruption by preventing array overflow On one side we have indio_dev->num_channels includes all physical channels + timestamp channel. On other side we have an array allocated onl

  • CVE-2022-48926Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: usb: gadget: rndis: add spinlock for rndis response list There's no lock for rndis response list. It could cause list corruption if there're two different list_add at the same time like below. It's better to ad

  • CVE-2022-48943Aug 22, 2024
    affected < 5.14.21-150400.24.133.1fixed 5.14.21-150400.24.133.1

    In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: make apf token non-zero to fix bug In current async pagefault logic, when a page is ready, KVM relies on kvm_arch_can_dequeue_async_page_present() to determine whether to deliver a READY event to

Page 98 of 142