VYPR

rpm package

suse/kernel-livepatch-MICRO-6-0_Update_4&distro=SUSE Linux Micro 6.0

pkg:rpm/suse/kernel-livepatch-MICRO-6-0_Update_4&distro=SUSE%20Linux%20Micro%206.0

Vulnerabilities (576)

  • CVE-2024-46857Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix bridge mode operations when there are no VFs Currently, trying to set the bridge mode attribute when numvfs=0 leads to a crash: bridge link set dev eth2 hwmode vepa [ 168.967392] BUG: kernel NU

  • CVE-2024-46855Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_socket: fix sk refcount leaks We must put 'sk' reference before returning.

  • CVE-2024-46851Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() dc_state_destruct() nulls the resource context of the DC state. The pipe context passed to dcn10_set_drr() is a member of this resourc

  • CVE-2024-46848Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Limit the period on Haswell Running the ltp test cve-2015-3290 concurrently reports the following warnings. perfevents: irq loop stuck! WARNING: CPU: 31 PID: 32438 at arch/x86/events/intel/co

  • CVE-2024-46846Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: spi: rockchip: Resolve unbalanced runtime PM / system PM handling Commit e882575efc77 ("spi: rockchip: Suspend and resume the bus during NOIRQ_SYSTEM_SLEEP_PM ops") stopped respecting runtime PM status and simp

  • CVE-2024-46845Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: tracing/timerlat: Only clear timer if a kthread exists The timerlat tracer can use user space threads to check for osnoise and timer latency. If the program using this is killed via a SIGTERM, the threads are s

  • CVE-2024-46843Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Remove SCSI host only if added If host tries to remove ufshcd driver from a UFS device it would cause a kernel panic if ufshcd_async_scan fails during ufshcd_probe_hba before adding a SCSI host

  • CVE-2024-46842Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info The MBX_TIMEOUT return code is not handled in lpfc_get_sfp_info and the routine unconditionally frees submitted mailbox commands regardless of return sta

  • CVE-2024-46841Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() We handle errors here properly, ENOMEM isn't fatal, return the error.

  • CVE-2024-46840Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: btrfs: clean up our handling of refs == 0 in snapshot delete In reada we BUG_ON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could get a transient incorrect answe

  • CVE-2024-46836Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: usb: gadget: aspeed_udc: validate endpoint index for ast udc We should verify the bound of the array to assure that host may not manipulate the index to point past endpoint array. Found by static analysis.

  • CVE-2024-46835Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix smatch static checker warning adev->gfx.imu.funcs could be NULL

  • CVE-2024-46834Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: ethtool: fail closed if we can't get max channel used in indirection tables Commit 0d1b7d6c9274 ("bnxt: fix crashes when reducing ring count with active RSS contexts") proves that allowing indirection table to

  • CVE-2024-46831Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: net: microchip: vcap: Fix use-after-free error in kunit test This is a clear use-after-free error. We remove it, and rely on checking the return code of vcap_del_rule.

  • CVE-2024-46828Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: fix bulk flow accounting logic for host fairness In sch_cake, we keep track of the count of active bulk flows per host, when running in dst/src host fairness mode, which is used as the round-ro

  • CVE-2024-46827Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix firmware crash due to invalid peer nss Currently, if the access point receives an association request containing an Extended HE Capabilities Information Element with an invalid MCS-NSS, it tri

  • CVE-2024-46826Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_space" twice. It is sysctl and can change at any moment, so 2 loads could see 2 different values in theory with unpredictable consequ

  • CVE-2024-46825Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check The lookup function iwl_mvm_rcu_fw_link_id_to_link_conf() is normally called with input from the firmware, so it should use IWL_FW_CHECK() instead of WARN_

  • CVE-2024-46819Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: the warning dereferencing obj for nbio_v7_4 if ras_manager obj null, don't print NBIO err data

  • CVE-2024-46818Sep 27, 2024
    affected < 1-1.2fixed 1-1.2

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check gpio_id before used as array index [WHY & HOW] GPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore should be checked in advance. This fixes 5 OVERRUN issues reported

Page 25 of 29