VYPR

rpm package

suse/kernel-livepatch-SLE15-SP4_Update_38&distro=SUSE Linux Enterprise Live Patching 15 SP4

pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_38&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4

Vulnerabilities (486)

  • CVE-2022-49429Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/hfi1: Prevent panic when SDMA is disabled If the hfi1 module is loaded with HFI1_CAP_SDMA off, a call to hfi1_write_iter() will dereference a NULL pointer and panic. A typical stack frame is: sdma_selec

  • CVE-2022-49427Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: Remove clk_disable in mtk_iommu_remove After the commit b34ea31fe013 ("iommu/mediatek: Always enable the clk on resume"), the iommu clock is controlled by the runtime callback. thus remove the c

  • CVE-2022-49426Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu-v3-sva: Fix mm use-after-free We currently call arm64_mm_context_put() without holding a reference to the mm, which can result in use-after-free. Call mmgrab()/mmdrop() to ensure the mm only gets

  • CVE-2022-49424Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: Fix NULL pointer dereference when printing dev_name When larbdev is NULL (in the case I hit, the node is incorrectly set iommus = <&iommu NUM>), it will cause device_link_add() fail and kernel c

  • CVE-2022-49422Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix the error handling path in idxd_cdev_register() If a call to alloc_chrdev_region() fails, the already allocated resources are leaking. Add the needed error handling path to fix the leak.

  • CVE-2022-49421Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node

  • CVE-2022-49418Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: NFSv4: Fix free of uninitialized nfs4_label on referral lookup. Send along the already-allocated fattr along with nfs4_fs_locations, and drop the memcpy of fattr. We end up growing two more allocations, but th

  • CVE-2022-49416Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix use-after-free in chanctx code In ieee80211_vif_use_reserved_context(), when we have an old context and the new context's replace_state is set to IEEE80211_CHANCTX_REPLACE_NONE, we free the

  • CVE-2022-49414Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix race condition between ext4_write and ext4_convert_inline_data Hulk Robot reported a BUG_ON: ================================================================== EXT4-fs error (device loop3): ext4_mb_

  • CVE-2022-49413Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: bfq: Update cgroup information before merging bio When the process is migrated to a different cgroup (or in case of writeback just starts submitting bios associated with a different cgroup) bfq_merge_bio() can

  • CVE-2022-49412Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: bfq: Avoid merging queues with different parents It can happen that the parent of a bfqq changes between the moment we decide two queues are worth to merge (and set bic->stable_merge_bfqq) and the moment bfq_se

  • CVE-2022-49411Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: bfq: Make sure bfqg for which we are queueing requests is online Bios queued into BFQ IO scheduler can be associated with a cgroup that was already offlined. This may then cause insertion of this bfq_group into

  • CVE-2022-49410Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: tracing: Fix potential double free in create_var_ref() In create_var_ref(), init_var_ref() is called to initialize the fields of variable ref_field, which is allocated in the previous function call to create_hi

  • CVE-2022-49409Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix bug_on in __es_tree_search Hulk Robot reported a BUG_ON: ================================================================== kernel BUG at fs/ext4/extents_status.c:199! [...] RIP: 0010:ext4_es_end fs/e

  • CVE-2022-49407Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: dlm: fix plock invalid read This patch fixes an invalid read showed by KASAN. A unlock will allocate a "struct plock_op" and a followed send_op() will append it to a global send_list data structure. In some cas

  • CVE-2022-49404Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/hfi1: Fix potential integer multiplication overflow errors When multiplying of different types, an overflow is possible even when storing the result in a larger type. This is because the conversion is done

  • CVE-2022-49402Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: ftrace: Clean up hash direct_functions on register failures We see the following GPF when register_ftrace_direct fails: [ ] general protection fault, probably for non-canonical address \ 0x200000000000010: 0

  • CVE-2022-49400Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: md: Don't set mddev private to NULL in raid0 pers->free In normal stop process, it does like this: do_md_stop | __md_stop (pers->free(); mddev->private=NULL) | md_free (free mddev) __md_sto

  • CVE-2022-49399Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: tty: goldfish: Use tty_port_destroy() to destroy port In goldfish_tty_probe(), the port initialized through tty_port_init() should be destroyed in error paths.In goldfish_tty_remove(), qtty->port also should be

  • CVE-2022-49398Feb 26, 2025
    affected < 1-150400.9.3.1fixed 1-150400.9.3.1

    In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback The list_for_each_entry_safe() macro saves the current item (n) and the item after (n+1), so that n can be safely removed without corrupti

Page 11 of 25