VYPR

rpm package

suse/kernel-livepatch-SLE15-SP6_Update_4&distro=SUSE Linux Enterprise Live Patching 15 SP6

pkg:rpm/suse/kernel-livepatch-SLE15-SP6_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6

Vulnerabilities (460)

  • CVE-2024-40902Jul 12, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: jfs: xattr: fix buffer overflow for invalid xattr When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. But when that xattr size is bigger than t

  • CVE-2024-40900Jul 12, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: cachefiles: remove requests from xarray during flushing requests Even with CACHEFILES_DEAD set, we can still read the requests, so in the following concurrency the request may be used after it has been freed:

  • CVE-2024-40899Jul 12, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() We got the following issue in a fuzz test of randomly issuing the restore command: ==========================================================

  • CVE-2024-39510Jul 12, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() We got the following issue in a fuzz test of randomly issuing the restore command: =====================================================

  • CVE-2024-39508Jul 12, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags Utilize set_bit() and test_bit() on worker->flags within io_uring/io-wq to address potential data races. The structure io_worker->flags may be acce

  • CVE-2024-39506Jul 12, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet In lio_vf_rep_copy_packet() pg_info->page is compared to a NULL value, but then it is unconditionally passed to skb_add_rx_frag() which lo

  • CVE-2024-39505Jul 12, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: drm/komeda: check for error-valued pointer komeda_pipeline_get_state() may return an error-valued pointer, thus check the pointer for negative or null value before dereferencing.

  • CVE-2024-39500Jul 12, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: sock_map: avoid race between sock_map_close and sk_psock_put sk_psock_get will return NULL if the refcount of psock has gone to 0, which will happen when the last call of sk_psock_put is done. However, sk_psock

  • CVE-2024-39499Jul 12, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: vmci: prevent speculation leaks by sanitizing event in event_deliver() Coverity spotted that event_msg is controlled by user-space, event_msg->event_data.event is passed to event_deliver() and used as an index

  • CVE-2024-39497Jul 12, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) Lack of check for copy-on-write (COW) mapping in drm_gem_shmem_mmap allows users to call mmap with PROT_WRITE and MAP_PRIVATE flag causing a kerne

  • CVE-2024-39493MedJul 10, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak Using completion_done to determine whether the caller has gone away only works after a complete call. Furthermore it's still possible that the caller has not ye

  • CVE-2024-39489MedJul 10, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix memleak in seg6_hmac_init_algo seg6_hmac_init_algo returns without cleaning up the previous allocations if one fails, so it's going to leak all that memory and the crypto tfms. Update seg6_hmac_e

  • CVE-2024-39491Jul 10, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance The cs_dsp instance is initialized in the driver probe() so it should be freed in the driver remove(). Also fix a missing call to cs_dsp_remove() in the error

  • CVE-2024-39488Jul 10, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY When CONFIG_DEBUG_BUGVERBOSE=n, we fail to add necessary padding bytes to bug_table entries, and as a result the last entry in a bug table will be ignored,

  • CVE-2024-39486Jul 6, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: drm/drm_file: Fix pid refcounting race <maarten.lankhorst@linux.intel.com>, Maxime Ripard <mripard@kernel.org>, Thomas Zimmermann <tzimmermann@suse.de> filp->pid is supposed to be a refcounted pointer; however

  • CVE-2024-39484Jul 5, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit for the remove function results in the remove callback being discarded with CONFIG_MMC_DAVINCI=y. When such a device gets unbound (e

  • CVE-2024-39483Jul 5, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked When requesting an NMI window, WARN on vNMI support being enabled if and only if NMIs are actually masked, i.e. if the vCPU is already handling a

  • CVE-2024-39476Jul 5, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING Xiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with small possibility, the root cause is exactly the same as

  • CVE-2024-38662MedJun 21, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: bpf: Allow delete from sockmap/sockhash only if update is allowed We have seen an influx of syzkaller reports where a BPF program attached to a tracepoint triggers a locking rule violation by performing a map_d

  • CVE-2024-36288MedJun 21, 2024
    affected < 1-150600.13.3.3fixed 1-150600.13.3.3

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token->pages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe wild-memory-access in range [0x

Page 20 of 23