VYPR

rpm package

suse/kernel-livepatch-SLE15-SP6_Update_9&distro=SUSE Linux Enterprise Live Patching 15 SP6

pkg:rpm/suse/kernel-livepatch-SLE15-SP6_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6

Vulnerabilities (110)

  • CVE-2024-49884HigOct 21, 2024
    affected < 1-150600.13.3.4fixed 1-150600.13.3.4

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix slab-use-after-free in ext4_split_extent_at() We hit the following use-after-free: ================================================================== BUG: KASAN: slab-use-after-free in ext4_split_ext

  • CVE-2024-49950Oct 21, 2024
    affected < 1-150600.13.3.4fixed 1-150600.13.3.4

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 Read of size 8 at addr ffff8880241e9800 by

  • CVE-2024-47701HigOct 21, 2024
    affected < 1-150600.13.3.4fixed 1-150600.13.3.4

    In the Linux kernel, the following vulnerability has been resolved: ext4: avoid OOB when system.data xattr changes underneath the filesystem When looking up for an entry in an inlined directory, if e_value_offs is changed underneath the filesystem by some change in the block de

  • CVE-2024-45010Sep 11, 2024
    affected < 1-150600.13.3.4fixed 1-150600.13.3.4

    In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: only mark 'subflow' endp as available Adding the following warning ... WARN_ON_ONCE(msk->pm.local_addr_used == 0) ... before decrementing the local_addr_used counter helped to find a bug when run

  • CVE-2024-45009Sep 11, 2024
    affected < 1-150600.13.3.4fixed 1-150600.13.3.4

    In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: only decrement add_addr_accepted for MPJ req Adding the following warning ... WARN_ON_ONCE(msk->pm.add_addr_accepted == 0) ... before decrementing the add_addr_accepted counter helped to find a b

  • CVE-2024-44974HigSep 4, 2024
    affected < 1-150600.13.3.4fixed 1-150600.13.3.4

    In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: avoid possible UaF when selecting endp select_local_address() and select_signal_address() both select an endpoint entry from the list inside an RCU protected section, but return a reference to it, to

  • CVE-2024-41055Jul 29, 2024
    affected < 1-150600.13.3.4fixed 1-150600.13.3.4

    In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid() Commit 5ec8e8ea8b77 ("mm/sparsemem: fix race in accessing memory_section->usage") changed pfn_section_valid() to add a READ_ONCE() call around "ms->usage"

  • CVE-2024-40980MedJul 12, 2024
    affected < 1-150600.13.3.4fixed 1-150600.13.3.4

    In the Linux kernel, the following vulnerability has been resolved: drop_monitor: replace spin_lock by raw_spin_lock trace_drop_common() is called with preemption disabled, and it acquires a spin_lock. This is problematic for RT kernels because spin_locks are sleeping locks in

  • CVE-2024-26810MedApr 5, 2024
    affected < 1-150600.13.3.4fixed 1-150600.13.3.4

    In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Lock external INTx masking ops Mask operations through config space changes to DisINTx may race INTx configuration changes via ioctl. Create wrappers that add locking for paths outside of the core in

  • CVE-2024-26708Apr 3, 2024
    affected < 1-150600.13.3.4fixed 1-150600.13.3.4

    In the Linux kernel, the following vulnerability has been resolved: mptcp: really cope with fastopen race Fastopen and PM-trigger subflow shutdown can race, as reported by syzkaller. In my first attempt to close such race, I missed the fact that the subflow status can change a

Page 6 of 6