VYPR

rpm package

suse/kernel-rt&distro=SUSE Linux Enterprise Micro 5.2

pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Vulnerabilities (1,678)

  • CVE-2022-49065Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix the svc_deferred_event trace class Fix a NULL deref crash that occurs when an svc_rqst is deferred while the sunrpc tracing subsystem is enabled. svc_revisit() sets dr->xprt to NULL, so it can't be

  • CVE-2022-49063Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: ice: arfs: fix use-after-free when freeing @rx_cpu_rmap The CI testing bots triggered the following splat: [ 718.203054] BUG: KASAN: use-after-free in free_irq_cpu_rmap+0x53/0x80 [ 718.206349] Read of size 4

  • CVE-2022-49059Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: nfc: nci: add flush_workqueue to prevent uaf Our detector found a concurrent use-after-free bug when detaching an NCI device. The main reason for this bug is the unexpected scheduling between the used delayed m

  • CVE-2022-49058Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: cifs: potential buffer overflow in handling symlinks Smatch printed a warning: arch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error: __memcpy() 'dctx->buf' too small (16 vs u32max) It's caused be

  • CVE-2022-49055Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Check for potential null return of kmalloc_array() As the kmalloc_array() may return null, the 'event_waiters[i].wait' would lead to null-pointer dereference. Therefore, it is better to check the re

  • CVE-2022-49053Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: target: tcmu: Fix possible page UAF tcmu_try_get_data_page() looks up pages under cmdr_lock, but it does not take refcount properly and just returns page pointer. When tcmu_try_get_data_page() returns, th

  • CVE-2022-49051Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup aqc111_rx_fixup() contains several out-of-bounds accesses that can be triggered by a malicious (or defective) USB device, in particular: - The metadata

  • CVE-2022-49044Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: dm integrity: fix memory corruption when tag_size is less than digest size It is possible to set up dm-integrity in such a way that the "tag_size" parameter is less than the actual digest size. In this situatio

  • CVE-2021-47653Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: media: davinci: vpif: fix use-after-free on driver unbind The driver allocates and registers two platform device structures during probe, but the devices were never deregistered on driver unbind. This results

  • CVE-2021-47652Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() I got a null-ptr-deref report: BUG: kernel NULL pointer dereference, address: 0000000000000000 ... RIP: 0010:fb_destroy_modelist+0x38/0x100 ... Call

  • CVE-2021-47651Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: soc: qcom: rpmpd: Check for null return of devm_kcalloc Because of the possible failure of the allocation, data->domains might be NULL pointer and will cause the dereference of the NULL pointer later. Therefore

  • CVE-2021-47650Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-compress: prevent the potentially use of null pointer There is one call trace that snd_soc_register_card() ->snd_soc_bind_card()->soc_init_pcm_runtime() ->snd_soc_dai_compress_new()->snd_soc_new_compr

  • CVE-2021-47642Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow Coverity complains of a possible buffer overflow. However, given the 'static' scope of nvidia_setup_i2c_bus() it looks like that can't happen aft

  • CVE-2021-47641Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: video: fbdev: cirrusfb: check pixclock to avoid divide by zero Do a sanity check on pixclock value to avoid divide by zero. If the pixclock value is zero, the cirrusfb driver will round up pixclock to get the

  • CVE-2021-47633Feb 26, 2025
    affected < 5.3.18-150300.202.1fixed 5.3.18-150300.202.1

    In the Linux kernel, the following vulnerability has been resolved: ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 The bug was found during fuzzing. Stacktrace locates it in ath5k_eeprom_convert_pcal_info_5111. When none of the curve is selected in the loop, idx can go up t

  • CVE-2021-47631Feb 26, 2025
    affected < 5.3.18-150300.205.1fixed 5.3.18-150300.205.1

    In the Linux kernel, the following vulnerability has been resolved: ARM: davinci: da850-evm: Avoid NULL pointer dereference With newer versions of GCC, there is a panic in da850_evm_config_emac() when booting multi_v5_defconfig in QEMU under the palmetto-bmc machine: Unable to

  • CVE-2025-21702HigFeb 18, 2025
    affected < 5.3.18-150300.214.1fixed 5.3.18-150300.214.1

    In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 Expected behaviour: In case we reach scheduler's limit, pfifo_tail_enqueue() will drop a packet in scheduler's queue and decrease scheduler's qlen by one

  • CVE-2025-21703Feb 18, 2025
    affected < 5.3.18-150300.214.1fixed 5.3.18-150300.214.1

    In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_backlog() notifies parent qdisc only if child qdisc becomes empty, therefore we need to reduce the backlog of the child qdisc befor

  • CVE-2022-28693MedFeb 14, 2025
    affected < 5.3.18-150300.112.1fixed 5.3.18-150300.112.1

    Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

  • CVE-2025-21700Feb 13, 2025
    affected < 5.3.18-150300.214.1fixed 5.3.18-150300.214.1

    In the Linux kernel, the following vulnerability has been resolved: net: sched: Disallow replacing of child qdisc from one parent to another Lion Ackermann was able to create a UAF which can be abused for privilege escalation with the following script Step 1. create root qdisc

Page 33 of 84