VYPR

rpm package

suse/kernel-livepatch-SLE15-SP5_Update_21&distro=SUSE Linux Enterprise Live Patching 15 SP5

pkg:rpm/suse/kernel-livepatch-SLE15-SP5_Update_21&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5

Vulnerabilities (472)

  • CVE-2024-46859HigSep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses The panasonic laptop code in various places uses the SINF array with index values of 0 - SINF_CUR_BRIGHT(0x0d) without checking that the SIN

  • CVE-2024-46854HigSep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: net: dpaa: Pad packets to ETH_ZLEN When sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is lea

  • CVE-2024-46853HigSep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: spi: nxp-fspi: fix the KASAN report out-of-bounds bug Change the memcpy length to fix the out-of-bounds issue when writing the data that is not 4 byte aligned to TX FIFO. To reproduce the issue, write 3 bytes

  • CVE-2024-46849HigSep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: meson: axg-card: fix 'use-after-free' Buffer 'card->dai_link' is reallocated in 'meson_card_reallocate_links()', so move 'pad' pointer initialization after this function when memory is already reallocated

  • CVE-2024-46821HigSep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Fix negative array index read Avoid using the negative values for clk_idex as an index into an array pptable->DpmDescriptor. V2: fix clk_index return check (Tim Huang)

  • CVE-2024-46813HigSep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check link_index before accessing dc->links[] [WHY & HOW] dc->links[] has max size of MAX_LINKS and NULL is return when trying to access with out-of-bound index. This fixes 3 OVERRUN and 1 RES

  • CVE-2024-46812HigSep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration [Why] Coverity reports Memory - illegal accesses. [How] Skip inactive planes.

  • CVE-2024-46864Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: x86/hyperv: fix kexec crash due to VP assist page corruption commit 9636be85cc5b ("x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline") introduces a new cpuhp state for hyperv initializa

  • CVE-2024-46857Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix bridge mode operations when there are no VFs Currently, trying to set the bridge mode attribute when numvfs=0 leads to a crash: bridge link set dev eth2 hwmode vepa [ 168.967392] BUG: kernel NU

  • CVE-2024-46855Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_socket: fix sk refcount leaks We must put 'sk' reference before returning.

  • CVE-2024-46848Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Limit the period on Haswell Running the ltp test cve-2015-3290 concurrently reports the following warnings. perfevents: irq loop stuck! WARNING: CPU: 31 PID: 32438 at arch/x86/events/intel/co

  • CVE-2024-46842Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info The MBX_TIMEOUT return code is not handled in lpfc_get_sfp_info and the routine unconditionally frees submitted mailbox commands regardless of return sta

  • CVE-2024-46841Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() We handle errors here properly, ENOMEM isn't fatal, return the error.

  • CVE-2024-46840Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: clean up our handling of refs == 0 in snapshot delete In reada we BUG_ON(refs == 0), which could be unkind since we aren't holding a lock on the extent leaf and thus could get a transient incorrect answe

  • CVE-2024-46835Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix smatch static checker warning adev->gfx.imu.funcs could be NULL

  • CVE-2024-46834Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: ethtool: fail closed if we can't get max channel used in indirection tables Commit 0d1b7d6c9274 ("bnxt: fix crashes when reducing ring count with active RSS contexts") proves that allowing indirection table to

  • CVE-2024-46828Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: fix bulk flow accounting logic for host fairness In sch_cake, we keep track of the count of active bulk flows per host, when running in dst/src host fairness mode, which is used as the round-ro

  • CVE-2024-46826Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_space" twice. It is sysctl and can change at any moment, so 2 loads could see 2 different values in theory with unpredictable consequ

  • CVE-2024-46819Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: the warning dereferencing obj for nbio_v7_4 if ras_manager obj null, don't print NBIO err data

  • CVE-2024-46818Sep 27, 2024
    affected < 1-150500.11.5.1fixed 1-150500.11.5.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check gpio_id before used as array index [WHY & HOW] GPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore should be checked in advance. This fixes 5 OVERRUN issues reported

Page 20 of 24