VYPR

rpm package

suse/kernel-docs&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP3

pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3

Vulnerabilities (1,468)

  • CVE-2024-45016MedSep 11, 2024
    affected < 5.3.18-150300.59.182.2fixed 5.3.18-150300.59.182.2

    In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free.

  • CVE-2024-45026Sep 11, 2024
    affected < 5.3.18-150300.59.182.2fixed 5.3.18-150300.59.182.2

    In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix error recovery leading to data corruption on ESE devices Extent Space Efficient (ESE) or thin provisioned volumes need to be formatted on demand during usual IO processing. The dasd_ese_needs_fo

  • CVE-2024-45021Sep 11, 2024
    affected < 5.3.18-150300.59.179.1fixed 5.3.18-150300.59.179.1

    In the Linux kernel, the following vulnerability has been resolved: memcg_write_event_control(): fix a user-triggerable oops we are *not* guaranteed that anything past the terminating NUL is mapped (let alone initialized with anything sane).

  • CVE-2024-45003Sep 4, 2024
    affected < 5.3.18-150300.59.179.1fixed 5.3.18-150300.59.179.1

    In the Linux kernel, the following vulnerability has been resolved: vfs: Don't evict inode under the inode lru traversing context The inode reclaiming process(See function prune_icache_sb) collects all reclaimable inodes and mark them with I_FREEING flag at first, at that time,

  • CVE-2024-44947Sep 2, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: fuse: Initialize beyond-EOF page contents before setting uptodate fuse_notify_store(), unlike fuse_do_readpage(), does not enable page zeroing (because it can be used to change partial page contents). So fuse_

  • CVE-2024-44946Aug 31, 2024
    affected < 5.3.18-150300.59.179.1fixed 5.3.18-150300.59.179.1

    In the Linux kernel, the following vulnerability has been resolved: kcm: Serialise kcm_sendmsg() for the same socket. syzkaller reported UAF in kcm_release(). [0] The scenario is 1. Thread A builds a skb with MSG_MORE and sets kcm->seq_skb. 2. Thread A resumes building s

  • CVE-2024-43883Aug 23, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: usb: vhci-hcd: Do not drop references before new references are gained At a few places the driver carries stale pointers to references that can still be used. Make sure that does not happen. This strictly speak

  • CVE-2022-48934Aug 22, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() ida_simple_get() returns an id between min (0) and max (NFP_MAX_MAC_INDEX) inclusive. So NFP_MAX_MAC_INDEX (0xff) is a valid id. In order for th

  • CVE-2022-48933Aug 22, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix memory leak during stateful obj update stateful objects can be updated from the control plane. The transaction logic allocates a temporary object for this purpose. The ->init function

  • CVE-2022-48930Aug 22, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/ib_srp: Fix a deadlock Remove the flush_workqueue(system_long_wq) call since flushing system_long_wq is deadlock-prone and since that call is redundant with a preceding cancel_work_sync()

  • CVE-2022-48928Aug 22, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: iio: adc: men_z188_adc: Fix a resource leak in an error handling path If iio_device_register() fails, a previous ioremap() is left unbalanced. Update the error handling path and add the missing iounmap() call,

  • CVE-2022-48926Aug 22, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: usb: gadget: rndis: add spinlock for rndis response list There's no lock for rndis response list. It could cause list corruption if there're two different list_add at the same time like below. It's better to ad

  • CVE-2022-48925Aug 22, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Do not change route.addr.src_addr outside state checks If the state is not idle then resolve_prepare_src() should immediately fail and no change to global state should happen. However, it unconditiona

  • CVE-2022-48919Aug 22, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: cifs: fix double free race when mount fails in cifs_get_root() When cifs_get_root() fails during cifs_smb3_do_mount() we call deactivate_locked_super() which eventually will call delayed_free() which will free

  • CVE-2022-48912Aug 22, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: fix use-after-free in __nf_register_net_hook() We must not dereference @new_hooks after nf_hook_mutex has been released, because other threads might have freed our allocated hooks already. BUG: KASA

  • CVE-2022-48911Aug 22, 2024
    affected < 5.3.18-150300.59.179.1fixed 5.3.18-150300.59.179.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet

  • CVE-2022-48905Aug 22, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: ibmvnic: free reset-work-item when flushing Fix a tiny memory leak when flushing the reset work queue.

  • CVE-2022-48901Aug 22, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: do not start relocation until in progress drops are done We hit a bug with a recovering relocation on mount for one of our file systems in production. I reproduced this locally by injecting errors into

  • CVE-2021-4441Aug 22, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() In zynq_qspi_exec_mem_op(), kzalloc() is directly used in memset(), which could lead to a NULL pointer dereference on failure of kza

  • CVE-2022-48873Aug 21, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Don't remove map on creater_process and device_release Do not remove the map from the list on error path in fastrpc_init_create_process, instead call fastrpc_map_put, to avoid use-after-free. Do

Page 34 of 74