VYPR

rpm package

suse/kernel-rt&distro=SUSE Linux Enterprise Micro 5.2

pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Vulnerabilities (1,678)

  • CVE-2022-49495Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm/hdmi: check return value after calling platform_get_resource_byname() It will cause null-ptr-deref if platform_get_resource_byname() returns NULL, we need check the return value. Patchwork: https://pat

  • CVE-2022-49493Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: rt5645: Fix errorenous cleanup order There is a logic error when removing rt5645 device as the function rt5645_i2c_remove() first cancel the &rt5645->jack_detect_work and delete the &rt5645->btn_check_tim

  • CVE-2022-49492Feb 26, 2025
    affected < 5.3.18-150300.220.1fixed 5.3.18-150300.220.1

    In the Linux kernel, the following vulnerability has been resolved: nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags In nvme_alloc_admin_tags, the admin_q can be set to an error (typically -ENOMEM) if the blk_mq_init_queue call fails to set up the queue, which

  • CVE-2022-49491Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() It will cause null-ptr-deref in resource_size(), if platform_get_resource() returns NULL, move calling resource_size() after devm_ioremap_resource()

  • CVE-2022-49490Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected mdp5_get_global_state runs the risk of hitting a -EDEADLK when acquiring the modeset lock, but currently mdp5_pipe_release doesn't

  • CVE-2022-49489Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume BUG: Unable to handle kernel paging request at virtual address 006b6b6b6b6b6be3 Call trace: dpu_vbif_init

  • CVE-2022-49488Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected There is a possibility for mdp5_get_global_state to return -EDEADLK when acquiring the modeset lock, but currently global_state in

  • CVE-2022-49482Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done.

  • CVE-2022-49481Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt of_node_get() returns a node with refcount incremented. Calling of_node_put() to drop the reference when not needed anymore.

  • CVE-2022-49478Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init Syzbot reported that -1 is used as array index. The problem was in missing validation check. hdw->unit_number is initialized with -1 and then

  • CVE-2022-49475Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname() It will cause null-ptr-deref if platform_get_resource_byname() returns NULL, we need check the return value.

  • CVE-2022-49474Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout Connecting the same socket twice consecutively in sco_sock_connect() could lead to a race condition where two sco_conn objects are created

  • CVE-2022-49473Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not needed anymore. Add missing of_node_pu

  • CVE-2022-49467Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: drm: msm: fix possible memory leak in mdp5_crtc_cursor_set() drm_gem_object_lookup will call drm_gem_object_get inside. So cursor_bo needs to be put when msm_gem_get_and_pin_iova fails.

  • CVE-2022-49465Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: blk-throttle: Set BIO_THROTTLED when bio has been throttled 1.In current process, all bio will set the BIO_THROTTLED flag after __blk_throtl_bio(). 2.If bio needs to be throttled, it will start the timer and s

  • CVE-2022-49462Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. a6xx_gmu_init() passes the node to

  • CVE-2022-49460Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: rk3399_dmc: Disable edev on remove() Otherwise we hit an unablanced enable-count when unbinding the DFI device: [ 1279.659119] ------------[ cut here ]------------ [ 1279.659179] WARNING: CPU: 2

  • CVE-2022-49459Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe platform_get_resource() may return NULL, add proper check to avoid potential NULL dereferencing.

  • CVE-2022-49455Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: misc: ocxl: fix possible double free in ocxl_file_register_afu info_release() will be called in device_unregister() when info->dev's reference count is 0. So there is no need to call ocxl_afu_put() and kfree()

  • CVE-2022-49451Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Fix list protocols enumeration in the base protocol While enumerating protocols implemented by the SCMI platform using BASE_DISCOVER_LIST_PROTOCOLS, the number of returned protocols is curre

Page 26 of 84