VYPR

rpm package

suse/kernel-docs&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP3

pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3

Vulnerabilities (1,468)

  • CVE-2022-48839Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: net/packet: fix slab-out-of-bounds access in packet_recvmsg() syzbot found that when an AF_PACKET socket is using PACKET_COPY_THRESH and mmap operations, tpacket_rcv() is queueing skbs with garbage in skb->cb[]

  • CVE-2022-48838Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: usb: gadget: Fix use-after-free bug by not setting udc->dev.driver The syzbot fuzzer found a use-after-free bug: BUG: KASAN: use-after-free in dev_uevent+0x712/0x780 drivers/base/core.c:2320 Read of size 8 at

  • CVE-2022-48837Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: usb: gadget: rndis: prevent integer overflow in rndis_set_response() If "BufOffset" is very large the "BufOffset + 8" operation can have an integer overflow.

  • CVE-2022-48836Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: Input: aiptek - properly check endpoint type Syzbot reported warning in usb_submit_urb() which is caused by wrong endpoint type. There was a check for the number of endpoints, but not for the type of endpoint.

  • CVE-2022-48835Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Page fault in reply q processing A page fault was encountered in mpt3sas on a LUN reset error path: [ 145.763216] mpt3sas_cm1: Task abort tm failed: handle(0x0002),timeout(30) tr_method(0x0) sm

  • CVE-2022-48834Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: usb: usbtmc: Fix bug in pipe direction for control transfers The syzbot fuzzer reported a minor bug in the usbtmc driver: usb 5-1: BOGUS control dir, pipe 80001e80 doesn't match bRequestType 0 WARNING: CPU: 0

  • CVE-2022-48827HigJul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix the behavior of READ near OFFSET_MAX Dan Aloni reports: > Due to commit 8cfb9015280d ("NFS: Always provide aligned buffers to > the RPC read layers") on the client, a read of 0xfff is aligned up > to

  • CVE-2022-48824Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: myrs: Fix crash in error case In myrs_detect(), cs->disable_intr is NULL when privdata->hw_init() fails with non-zero. In this case, myrs_cleanup(cs) will call a NULL ptr and crash the kernel. [ 1.105

  • CVE-2022-48823Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Fix refcount issue when LOGO is received during TMF Hung task call trace was seen during LOGO processing. [ 974.309060] [0000:00:00.0]:[qedf_eh_device_reset:868]: 1:0:2:0: LUN RESET Issued... [ 9

  • CVE-2022-48822Jul 16, 2024
    affected < 5.3.18-150300.59.170.2fixed 5.3.18-150300.59.170.2

    In the Linux kernel, the following vulnerability has been resolved: usb: f_fs: Fix use-after-free for epfile Consider a case where ffs_func_eps_disable is called from ffs_func_disable as part of composition switch and at the same time ffs_epfile_release get called from userspac

  • CVE-2022-48821Jul 16, 2024
    affected < 5.3.18-150300.59.170.2fixed 5.3.18-150300.59.170.2

    In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: avoid double fput() on failed usercopy If the copy back to userland fails for the FASTRPC_IOCTL_ALLOC_DMA_BUFF ioctl(), we shouldn't assume that 'buf->dmabuf' is still valid. In fact, dma_buf_fd(

  • CVE-2022-48811Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: ibmvnic: don't release napi in __ibmvnic_open() If __ibmvnic_open() encounters an error such as when setting link state, it calls release_resources() which frees the napi structures needlessly. Instead, have __

  • CVE-2022-48805Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup ax88179_rx_fixup() contains several out-of-bounds accesses that can be triggered by a malicious (or defective) USB device, in particular: - The m

  • CVE-2022-48802Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: fs/proc: task_mmu.c: don't read mapcount for migration entry The syzbot reported the below BUG: kernel BUG at include/linux/page-flags.h:785! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 4392

  • CVE-2022-48798Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: s390/cio: verify the driver availability for path_event call If no driver is attached to a device or the driver does not provide the path_event function, an FCES path-event on this device could end up in a kern

  • CVE-2022-48792Jul 16, 2024
    affected < 5.3.18-150300.59.170.2fixed 5.3.18-150300.59.170.2

    In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task Currently a use-after-free may occur if a sas_task is aborted by the upper layer before we handle the I/O completion in mpi_ssp_completion() or mpi_

  • CVE-2022-48791Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted TMF sas_task Currently a use-after-free may occur if a TMF sas_task is aborted before we handle the IO completion in mpi_ssp_completion(). The abort occurs due to ti

  • CVE-2022-48790Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: nvme: fix a possible use-after-free in controller reset during load Unlike .queue_rq, in .submit_async_event drivers may not check the ctrl readiness for AER submission. This may lead to a use-after-free condit

  • CVE-2022-48789Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix possible use-after-free in transport error_recovery work While nvme_tcp_submit_async_event_work is checking the ctrl and queue state before preparing the AER command and scheduling io_work, in ord

  • CVE-2022-48788Jul 16, 2024
    affected < 5.3.18-150300.59.174.1fixed 5.3.18-150300.59.174.1

    In the Linux kernel, the following vulnerability has been resolved: nvme-rdma: fix possible use-after-free in transport error_recovery work While nvme_rdma_submit_async_event_work is checking the ctrl and queue state before preparing the AER command and scheduling io_work, in o

Page 36 of 74