VYPR

rpm package

suse/kernel-livepatch-SLE15-SP6-RT_Update_1&distro=SUSE Linux Enterprise Live Patching 15 SP6

pkg:rpm/suse/kernel-livepatch-SLE15-SP6-RT_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6

Vulnerabilities (834)

  • CVE-2024-26973MedMay 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: fat: fix uninitialized field in nostale filehandles When fat_encode_fh_nostale() encodes file handle without a parent it stores only first 10 bytes of the file handle. However the length of the file handle must

  • CVE-2024-26961HigMay 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: mac802154: fix llsec key resources release in mac802154_llsec_key_del mac802154_llsec_key_del() can free resources of a key directly without following the RCU rules for waiting before the end of a grace period.

  • CVE-2024-26960MedMay 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix race between free_swap_and_cache() and swapoff() There was previously a theoretical window where swapoff() could run and teardown a swap_info_struct while a call to free_swap_and_cache() was runni

  • CVE-2024-26958HigMay 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: nfs: fix UAF in direct writes In production we have been hitting the following warning consistently ------------[ cut here ]------------ refcount_t: underflow; use-after-free. WARNING: CPU: 17 PID: 1800359 at

  • CVE-2024-26951HigMay 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: wireguard: netlink: check for dangling peer via is_dead instead of empty list If all peers are removed via wg_peer_remove_all(), rather than setting peer_list to empty, the peer is added to a temporary list wit

  • CVE-2024-26950MedMay 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: wireguard: netlink: access device through ctx instead of peer The previous commit fixed a bug that led to a NULL peer->device being dereferenced. It's actually easier and faster performance-wise to instead get

  • CVE-2024-26937MedMay 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: Reset queue_priority_hint on parking Originally, with strict in order execution, we could complete execution only when the queue was empty. Preempt-to-busy allows replacement of an active request t

  • CVE-2024-26935MedMay 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix unremoved procfs host directory regression Commit fc663711b944 ("scsi: core: Remove the /proc/scsi/${proc_name} directory earlier") fixed a bug related to modules loading/unloading, by adding a

  • CVE-2024-26934HigMay 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix deadlock in usb_deauthorize_interface() Among the attribute file callback routines in drivers/usb/core/sysfs.c, the interface_authorized_store() function is the only one which acquires a device l

  • CVE-2024-27019May 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() nft_unregister_obj() can concurrent with __nft_obj_type_get(), and there is not any protection when iterate over nf_tables_objects list in _

  • CVE-2024-27016May 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: validate pppoe header Ensure there is sufficient room to access the protocol field of the PPPoe header. Validate it once before the flowtable lookup, then use a helper function to access p

  • CVE-2024-27015May 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: incorrect pppoe tuple pppoe traffic reaching ingress path does not match the flowtable entry because the pppoe header is expected to be at the network header offset. This bug causes a mism

  • CVE-2024-27014May 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Prevent deadlock while disabling aRFS When disabling aRFS under the `priv->state_lock`, any scheduled aRFS works are canceled using the `cancel_work_sync` function, which waits for the work to end if

  • CVE-2024-27012May 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: restore set elements when delete set fails From abort path, nft_mapelem_activate() needs to restore refcounters to the original state. Currently, it uses the set->ops->walk() to iterate ov

  • CVE-2024-27008May 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: drm: nv04: Fix out of bounds access When Output Resource (dcb->or) value is assigned in fabricate_dcb_output(), there may be out of bounds access to dac_users array in case dcb->or is zero because ffs(dcb->or)

  • CVE-2024-27003May 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: clk: Get runtime PM before walking tree for clk_summary Similar to the previous commit, we should make sure that all devices are runtime resumed before printing the clk_summary through debugfs. Failure to do so

  • CVE-2024-27002May 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: Do a runtime PM get on controllers during probe mt8183-mfgcfg has a mutual dependency with genpd during the probing stage, which leads to a deadlock in the following call stack: CPU0: genpd_loc

  • CVE-2024-27001May 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: comedi: vmk80xx: fix incomplete endpoint checking While vmk80xx does have endpoint checking implemented, some things can fall through the cracks. Depending on the hardware model, URBs can have either bulk or in

  • CVE-2024-27000May 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: serial: mxs-auart: add spinlock around changing cts state The uart_handle_cts_change() function in serial_core expects the caller to hold uport->lock. For example, I have seen the below kernel splat, when the B

  • CVE-2024-26999May 1, 2024
    affected < 1-150600.1.5.1fixed 1-150600.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: serial/pmac_zilog: Remove flawed mitigation for rx irq flood The mitigation was intended to stop the irq completely. That may be better than a hard lock-up but it turns out that you get a crash anyway if you're

Page 34 of 42