VYPR

rpm package

suse/kernel-livepatch-SLE15-SP4_Update_33&distro=SUSE Linux Enterprise Live Patching 15 SP4

pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_33&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4

Vulnerabilities (153)

  • CVE-2022-48988Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: memcg: fix possible use-after-free in memcg_write_event_control() memcg_write_event_control() accesses the dentry->d_name of the specified control fd to route the write call. As a cgroup interface file can't b

  • CVE-2022-48987Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: media: v4l2-dv-timings.c: fix too strict blanking sanity checks Sanity checks were added to verify the v4l2_bt_timings blanking fields in order to avoid integer overflows when userspace passes weird values. Bu

  • CVE-2022-48985Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix race on per-CQ variable napi work_done After calling napi_complete_done(), the NAPIF_STATE_SCHED bit may be cleared, and another CPU can start napi thread and access per-CQ variable, cq->work_don

  • CVE-2022-48981Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: drm/shmem-helper: Remove errant put in error path drm_gem_shmem_mmap() doesn't own this reference, resulting in the GEM object getting prematurely freed leading to a later use-after-free.

  • CVE-2022-48978Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: HID: core: fix shift-out-of-bounds in hid_report_raw_event Syzbot reported shift-out-of-bounds in hid_report_raw_event. microsoft 0003:045E:07DA.0001: hid_field_extract() called with n (128) > 32! (swapper/0)

  • CVE-2022-48977Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: can: af_can: fix NULL pointer dereference in can_rcv_filter Analogue to commit 8aa59e355949 ("can: af_can: fix NULL pointer dereference in can_rx_register()") we need to check for a missing initialization of ml

  • CVE-2022-48975Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: gpiolib: fix memory leak in gpiochip_setup_dev() Here is a backtrace report about memory leak detected in gpiochip_setup_dev(): unreferenced object 0xffff88810b406400 (size 512): comm "python3", pid 1682, ji

  • CVE-2022-48973Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: gpio: amd8111: Fix PCI device reference count leak for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the returned pci_dev

  • CVE-2022-48972Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() Kernel fault injection test reports null-ptr-deref as follows: BUG: kernel NULL pointer dereference, address: 0000000000000008 RIP: 0010:cfg802154_n

  • CVE-2022-48971Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix not cleanup led when bt_init fails bt_init() calls bt_leds_init() to register led, but if it fails later, bt_leds_cleanup() is not called to unregister it. This can cause panic if the argument "

  • CVE-2022-48970Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: af_unix: Get user_ns from in_skb in unix_diag_get_exact(). Wei Chen reported a NULL deref in sk_user_ns() [0][1], and Paolo diagnosed the root cause: in unix_diag_get_exact(), the newly allocated skb does not h

  • CVE-2022-48969Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: xen-netfront: Fix NULL sring after live migration A NAPI is setup for each network sring to poll data to kernel The sring with source host is destroyed before live migration and new sring with target host is se

  • CVE-2022-48968Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential memory leak in otx2_init_tc() In otx2_init_tc(), if rhashtable_init() failed, it does not free tc->tc_entries_bitmap which is allocated in otx2_tc_alloc_ent_bitmap().

  • CVE-2022-48967Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: NFC: nci: Bounds check struct nfc_target arrays While running under CONFIG_FORTIFY_SOURCE=y, syzkaller reported: memcpy: detected field-spanning write (size 129) of single field "target->sensf_res" at net/nf

  • CVE-2022-48962Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() The skb is delivered to napi_gro_receive() which may free it, after calling this, dereferencing skb may trigger use-after-free.

  • CVE-2022-48961Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: net: mdio: fix unbalanced fwnode reference count in mdio_device_release() There is warning report about of_node refcount leak while probing mdio device: OF: ERROR: memory leak, expected refcount 1 instead of 2

  • CVE-2022-48960Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() The skb is delivered to napi_gro_receive() which may free it, after calling this, dereferencing skb may trigger use-after-free.

  • CVE-2022-48959Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() When dsa_devlink_region_create failed in sja1105_setup_devlink_regions(), priv->regions is not released.

  • CVE-2022-48956Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: ipv6: avoid use-after-free in ip6_fragment() Blamed commit claimed rcu_read_lock() was held by ip6_fragment() callers. It seems to not be always true, at least for UDP stack. syzbot reported: BUG: KASAN: use

  • CVE-2022-48955Oct 21, 2024
    affected < 1-150400.9.5.1fixed 1-150400.9.5.1

    In the Linux kernel, the following vulnerability has been resolved: net: thunderbolt: fix memory leak in tbnet_open() When tb_ring_alloc_rx() failed in tbnet_open(), ida that allocated in tb_xdomain_alloc_out_hopid() is not released. Add tb_xdomain_release_out_hopid() to the er

Page 5 of 8