VYPR

rpm package

suse/kernel-livepatch-SLE15-SP2_Update_47&distro=SUSE Linux Enterprise Live Patching 15 SP2

pkg:rpm/suse/kernel-livepatch-SLE15-SP2_Update_47&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2

Vulnerabilities (135)

  • CVE-2023-52572Mar 2, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: cifs: Fix UAF in cifs_demultiplex_thread() There is a UAF when xfstests on cifs: BUG: KASAN: use-after-free in smb2_is_network_name_deleted+0x27/0x160 Read of size 4 at addr ffff88810103fc08 by task cifsd/

  • CVE-2023-52509Mar 2, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: ravb: Fix use-after-free issue in ravb_tx_timeout_work() The ravb_stop() should call cancel_work_sync(). Otherwise, ravb_tx_timeout_work() is possible to use the freed priv after ravb_remove() was called like b

  • CVE-2023-52500Mar 2, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command Tags allocated for OPC_INB_SET_CONTROLLER_CONFIG command need to be freed when we receive the response.

  • CVE-2021-47077Mar 1, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Add pointer checks in qedf_update_link_speed() The following trace was observed: [ 14.042059] Call Trace: [ 14.042061] [ 14.042068] qedf_link_update+0x144/0x1f0 [qedf] [ 14.0421

  • CVE-2021-47073Mar 1, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios init_dell_smbios_wmi() only registers the dell_smbios_wmi_driver on systems where the Dell WMI interface is supported. While exit_dell_smbios_wmi() u

  • CVE-2021-47071Mar 1, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Fix a memory leak in error handling paths If 'vmbus_establish_gpadl()' fails, the (recv|send)_gpadl will not be updated and 'hv_uio_cleanup()' in the error handling path will not be able to free

  • CVE-2021-47070Mar 1, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Fix another memory leak in error handling paths Memory allocated by 'vmbus_alloc_ring()' at the beginning of the probe function is never freed in the error handling path. Add the missing 'vmbus

  • CVE-2021-47069Mar 1, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry do_mq_timedreceive calls wq_sleep with a stack local address. The sender (do_mq_timedsend) uses this address to later call pipelined_sen

  • CVE-2021-47068Feb 29, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: net/nfc: fix use-after-free llcp_sock_bind/connect Commits 8a4cd82d ("nfc: fix refcount leak in llcp_sock_connect()") and c33b1cc62 ("nfc: fix refcount leak in llcp_sock_bind()") fixed a refcount leak bug in bi

  • CVE-2021-47065Feb 29, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: rtw88: Fix array overrun in rtw_get_tx_power_params() Using a kernel with the Undefined Behaviour Sanity Checker (UBSAN) enabled, the following array overrun is logged: ========================================

  • CVE-2021-47063Feb 29, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: drm: bridge/panel: Cleanup connector on bridge detach If we don't call drm_connector_cleanup() manually in panel_bridge_detach(), the connector will be cleaned up with the other DRM objects in the call to drm_m

  • CVE-2021-47061Feb 29, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU If allocating a new instance of an I/O bus fails when unregistering a device, wait to destroy the device until after all readers are guar

  • CVE-2021-47058Feb 29, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: regmap: set debugfs_name to NULL after it is freed There is a upstream commit cffa4b2122f5("regmap:debugfs: Fix a memory leak when calling regmap_attach_dev") that adds a if condition when create name for debug

  • CVE-2021-47056Feb 29, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init ADF_STATUS_PF_RUNNING is (only) used and checked by adf_vf2pf_shutdown() before calling adf_iov_putmsg()->mutex_lock(vf2pf_lock), however the

  • CVE-2021-47055Feb 29, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: mtd: require write permissions for locking and badblock ioctls MEMLOCK, MEMUNLOCK and OTPLOCK modify protection bits. Thus require write permission. Depending on the hardware MEMLOCK might even be write-once, e

  • CVE-2021-47020Feb 29, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: soundwire: stream: fix memory leak in stream config error path When stream config is failed, master runtime will release all slave runtime in the slave_rt_list, but slave runtime is not added to the list at thi

  • CVE-2024-26614Feb 29, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once When I run syz's reproduction C program locally, it causes the following issue: pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0! WARNING: CPU:

  • CVE-2023-52477Feb 29, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: usb: hub: Guard against accesses to uninitialized BOS descriptors Many functions in drivers/usb/core/hub.c and drivers/usb/core/hub.h access fields inside udev->bos without checking if it was allocated and init

  • CVE-2023-52476Feb 29, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: perf/x86/lbr: Filter vsyscall addresses We found that a panic can occur when a vsyscall is made while LBR sampling is active. If the vsyscall is interrupted (NMI) for perf sampling, this call sequence can occur

  • CVE-2021-47051Feb 28, 2024
    affected < 1-150200.5.3.3fixed 1-150200.5.3.3

    In the Linux kernel, the following vulnerability has been resolved: spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() pm_runtime_get_sync will increment pm usage counter even it failed. Forgetting to putting operation will result in reference leak here. Fix

Page 4 of 7