VYPR

rpm package

suse/kernel-livepatch-SLE15-SP4_Update_32&distro=SUSE Linux Enterprise Live Patching 15 SP4

pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_32&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4

Vulnerabilities (66)

  • CVE-2022-48944Aug 30, 2024
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: sched: Fix yet more sched_fork() races Where commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an invalid sched_task_group") fixed a fork race vs cgroup, it opened up a race vs syscalls by not placing

  • CVE-2022-48923Aug 22, 2024
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: prevent copying too big compressed lzo segment Compressed length can be corrupted to be a lot larger than memory we have allocated for buffer. This will cause memcpy in copy_compressed_segment to write o

  • CVE-2022-48911Aug 22, 2024
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet

  • CVE-2024-42301Aug 17, 2024
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: dev/parport: fix the array out-of-bounds risk Fixed array out-of-bounds issues caused by sprintf by replacing it with snprintf for safer data copying, ensuring the destination buffer is not overflowed. Below i

  • CVE-2024-41087Jul 29, 2024
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: ata: libata-core: Fix double free on error If e.g. the ata_port_alloc() call in ata_host_alloc() fails, we will jump to the err_out label, which will call devres_release_group(). devres_release_group() will tri

  • CVE-2024-26808Apr 4, 2024
    affected < 15-150400.2.1fixed 15-150400.2.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain Remove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER event is reported, otherwise a stale reference to netdevic

Page 4 of 4