VYPR

rpm package

suse/kernel-livepatch-SLE15-SP6_Update_6&distro=SUSE Linux Enterprise Live Patching 15 SP6

pkg:rpm/suse/kernel-livepatch-SLE15-SP6_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6

Vulnerabilities (559)

  • CVE-2024-41023Jul 29, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: sched/deadline: Fix task_struct reference leak During the execution of the following stress test with linux-rt: stress-ng --cyclic 30 --timeout 30 --minimize --quiet kmemleak frequently reported a memory leak

  • CVE-2024-41016MedJul 29, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() xattr in ocfs2 maybe 'non-indexed', which saved with additional space requested. It's better to check if the memory is out of bound before me

  • CVE-2024-40914Jul 12, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: don't unpoison huge_zero_folio When I did memory failure tests recently, below panic occurs: kernel BUG at include/linux/mm.h:1135! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 9 PID: 13

  • CVE-2024-36484MedJun 21, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time. Christoph reported the following splat: WARNING: CPU: 1 PID: 772 at net/ipv4/af_inet.c:761 __inet_accept+0x1f4/0x4a0 Modules linked in: CPU: 1 PID: 772 Comm: syz-e

  • CVE-2024-36244Jun 21, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: extend minimum interval restriction to entire cycle too It is possible for syzbot to side-step the restriction imposed by the blamed commit in the Fixes: tag, because the taprio UAPI permits

  • CVE-2024-38599HigJun 19, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: jffs2: prevent xattr node from overflowing the eraseblock Add a check to make sure that the requested xattr node size is no larger than the eraseblock minus the cleanmarker. Unlike the usual inode nodes, the x

  • CVE-2024-38589MedJun 19, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: netrom: fix possible dead-lock in nr_rt_ioctl() syzbot loves netrom, and found a possible deadlock in nr_rt_ioctl [1] Make sure we always acquire nr_node_list_lock before nr_node_lock(nr_node) [1] WARNING: po

  • CVE-2024-38577Jun 19, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow There is a possibility of buffer overflow in show_rcu_tasks_trace_gp_kthread() if counters, passed to sprintf() are huge. Counter numbers, needed f

  • CVE-2024-38576Jun 19, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: rcu: Fix buffer overflow in print_cpu_stall_info() The rcuc-starvation output from print_cpu_stall_info() might overflow the buffer if there is a huge difference in jiffies difference. The situation might seem

  • CVE-2024-36968Jun 8, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() l2cap_le_flowctl_init() can cause both div-by-zero and an integer overflow since hdev->le_mtu may not fall in the valid range. Move MTU from hci_dev

  • CVE-2024-36905MedMay 30, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets TCP_SYN_RECV state is really special, it is only used by cross-syn connections, mostly used by fuzzers. In the following crash [1], syzbot managed to

  • CVE-2024-36954May 30, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: tipc: fix a possible memleak in tipc_buf_append __skb_linearize() doesn't free the skb when it fails, so move '*buf = NULL' after __skb_linearize(), so that the skb can be freed on the err path.

  • CVE-2024-36927May 30, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix uninit-value access in __ip_make_skb() KMSAN reported uninit-value access in __ip_make_skb() [1]. __ip_make_skb() tests HDRINCL to know if the skb has icmphdr. However, HDRINCL can cause a race condi

  • CVE-2024-36920May 30, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING When the "storcli2 show" command is executed for eHBA-9600, mpi3mr driver prints this WARNING message: memcpy: detected field-spanning write (size 128)

  • CVE-2024-36886May 30, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: tipc: fix UAF in error path Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported a UAF in the tipc_buf_append() error path: BUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c

  • CVE-2024-36883May 30, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: net: fix out-of-bounds access in ops_init net_alloc_generic is called by net_alloc, which is called without any locking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It is read twice, first t

  • CVE-2024-36031May 30, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: keys: Fix overwrite of key expiration on instantiation The expiry time of a key is unconditionally overwritten during instantiation, defaulting to turn it permanent. This causes a problem for DNS resolution as

  • CVE-2023-52881May 29, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: tcp: do not accept ACK of bytes we never sent This patch is based on a detailed report and ideas from Yepeng Pan and Christian Rossow. ACK seq validation is currently following RFC 5961 5.2 guidelines: The

  • CVE-2023-52800May 21, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix htt pktlog locking The ath11k active pdevs are protected by RCU but the htt pktlog handling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a read-side critical section. Mark th

  • CVE-2023-52778May 21, 2024
    affected < 1-150600.13.3.5fixed 1-150600.13.3.5

    In the Linux kernel, the following vulnerability has been resolved: mptcp: deal with large GSO size After the blamed commit below, the TCP sockets (and the MPTCP subflows) can build egress packets larger than 64K. That exceeds the maximum DSS data size, the length being misrepr

Page 27 of 28