VYPR

rpm package

suse/kernel-obs-build&distro=SUSE Linux Enterprise Software Development Kit 12 SP5

pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5

Vulnerabilities (1,486)

  • CVE-2021-47202Apr 10, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: thermal: Fix NULL pointer dereferences in of_thermal_ functions of_parse_thermal_zones() parses the thermal-zones node and registers a thermal_zone device for each subnode. However, if a thermal zone is consumi

  • CVE-2021-47201Apr 10, 2024
    affected < 4.12.14-122.222.1fixed 4.12.14-122.222.1

    In the Linux kernel, the following vulnerability has been resolved: iavf: free q_vectors before queues in iavf_disable_vf iavf_free_queues() clears adapter->num_active_queues, which iavf_free_q_vectors() relies on, so swap the order of these two function calls in iavf_disable_v

  • CVE-2021-47198Apr 10, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine An error is detected with the following report when unloading the driver: "KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b" The NLP_REG_LOGIN_SEND nl

  • CVE-2021-47197Apr 10, 2024
    affected < 4.12.14-122.225.1fixed 4.12.14-122.225.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove() Prior to this patch in case mlx5_core_destroy_cq() failed it proceeds to rest of destroy operations. mlx5_core_destroy_cq() could be called again by

  • CVE-2021-47194Apr 10, 2024
    affected < 4.12.14-122.225.1fixed 4.12.14-122.225.1

    In the Linux kernel, the following vulnerability has been resolved: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type If the userspace tools switch from NL80211_IFTYPE_P2P_GO to NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it does not call the cleanu

  • CVE-2021-47193Apr 10, 2024
    affected < 4.12.14-122.222.1fixed 4.12.14-122.222.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: pm80xx: Fix memory leak during rmmod Driver failed to release all memory allocated. This would lead to memory leak during driver removal. Properly free memory when the module is removed.

  • CVE-2021-47191Apr 10, 2024
    affected < 4.12.14-122.222.1fixed 4.12.14-122.222.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() The following warning was observed running syzkaller: [ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;

  • CVE-2021-47189Apr 10, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: fix memory ordering between normal and ordered work functions Ordered work functions aren't guaranteed to be handled by the same thread which executed the normal work functions. The only way execution be

  • CVE-2021-47188Apr 10, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Improve SCSI abort handling The following has been observed on a test setup: WARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c Call trace: ufshcd_queu

  • CVE-2021-47185Apr 10, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc When running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup, which look like this one: Workqueue: events_unbound

  • CVE-2021-47184Apr 10, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: i40e: Fix NULL ptr dereference on VSI filter sync Remove the reason of null pointer dereference in sync VSI filters. Added new I40E_VSI_RELEASING flag to signalize deleting and releasing of VSI resources to syn

  • CVE-2021-47183Apr 10, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix link down processing to address NULL pointer dereference If an FC link down transition while PLOGIs are outstanding to fabric well known addresses, outstanding ABTS requests may result in a NULL

  • CVE-2021-47182Apr 10, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix scsi_mode_sense() buffer length handling Several problems exist with scsi_mode_sense() buffer length handling: 1) The allocation length field of the MODE SENSE(10) command is 16-bits, occu

  • CVE-2021-47181Apr 10, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: usb: musb: tusb6010: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.

  • CVE-2024-26816MedApr 10, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: x86, relocs: Ignore relocations in .notes section When building with CONFIG_XEN_PV=y, .text symbols are emitted into the .notes section so that Xen can find the "startup_xen" entry point. This information is us

  • CVE-2024-27437MedApr 5, 2024
    affected < 4.12.14-122.225.1fixed 4.12.14-122.225.1

    In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Disable auto-enable of exclusive INTx IRQ Currently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in request_irq() and subsequently dis

  • CVE-2024-26812MedApr 5, 2024
    affected < 4.12.14-122.228.2fixed 4.12.14-122.228.2

    In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Create persistent INTx handler A vulnerability exists where the eventfd for INTx signaling can be deconfigured, which unregisters the IRQ handler but still allows eventfds to be signaled with a NULL c

  • CVE-2024-26813Apr 5, 2024
    affected < 4.12.14-122.222.1fixed 4.12.14-122.222.1

    In the Linux kernel, the following vulnerability has been resolved: vfio/platform: Create persistent IRQ handlers The vfio-platform SET_IRQS ioctl currently allows loopback triggering of an interrupt before a signaling eventfd has been configured by the user, which thereby allo

  • CVE-2024-26805Apr 4, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter syzbot reported the following uninit-value access issue [1]: netlink_to_full_skb() creates a new `skb` and puts the `skb->data` passed as a 1st ar

  • CVE-2024-26793Apr 4, 2024
    affected < 4.12.14-122.216.1fixed 4.12.14-122.216.1

    In the Linux kernel, the following vulnerability has been resolved: gtp: fix use-after-free and null-ptr-deref in gtp_newlink() The gtp_link_ops operations structure for the subsystem must be registered after registering the gtp_net_ops pernet operations structure. Syzkaller h

Page 34 of 75