VYPR

rpm package

suse/kernel-rt&distro=SUSE Linux Enterprise Real Time 12 SP5

pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5

Vulnerabilities (1,429)

  • CVE-2024-46773Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check denominator pbn_div before used [WHAT & HOW] A denominator cannot be 0, and is checked before used. This fixes 1 DIVIDE_BY_ZERO issue reported by Coverity.

  • CVE-2024-46772Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check denominator crb_pipes before used [WHAT & HOW] A denominator cannot be 0, and is checked before used. This fixes 2 DIVIDE_BY_ZERO issues reported by Coverity.

  • CVE-2024-46770Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: ice: Add netif_device_attach/detach into PF reset flow Ethtool callbacks can be executed while reset is in progress and try to access deleted resources, e.g. getting coalesce settings can result in a NULL point

  • CVE-2024-46761Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv The hotplug driver for powerpc (pci/hotplug/pnv_php.c) causes a kernel crash when we try to hot-unplug/disable the PCIe switch/bridge from the PHB. The

  • CVE-2024-46753Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: handle errors from btrfs_dec_ref() properly In walk_up_proc() we BUG_ON(ret) from btrfs_dec_ref(). This is incorrect, we have proper error handling here, return the error.

  • CVE-2024-46747Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup report_fixup for the Cougar 500k Gaming Keyboard was not verifying that the report descriptor size was correct before accessing it

  • CVE-2024-46739Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind For primary VM Bus channels, primary_channel pointer is always NULL. This pointer is valid only for the secondary channels. Also, rescind ca

  • CVE-2024-46738Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix use-after-free when removing resource in vmci_resource_remove() When removing a resource from vmci_resource_table in vmci_resource_remove(), the search is performed using the resource handle by compar

  • CVE-2024-46737Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fix kernel crash if commands allocation fails If the commands allocation fails in nvmet_tcp_alloc_cmds() the kernel crashes in nvmet_tcp_release_queue_work() because of a NULL pointer dereference.

  • CVE-2024-46731Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix the Out-of-bounds read warning using index i - 1U may beyond element index for mc_data[] when i = 0.

  • CVE-2024-46727Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update [Why] Coverity reports NULL_RETURN warning. [How] Add otg_master NULL check.

  • CVE-2024-46723Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ucode out-of-bounds read warning Clear warning that read ucode[] may out-of-bounds.

  • CVE-2024-46722Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix mc_data out-of-bounds read warning Clear warning that read mc_data[i-1] may out-of-bounds.

  • CVE-2024-46721Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: apparmor: fix possible NULL pointer dereference profile->parent->dents[AAFS_PROF_DIR] could be NULL only if its parent is made from __create_missing_ancestors(..) and 'ent->old' is NULL in aa_replace_profiles(.

  • CVE-2024-46720Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix dereference after null check check the pointer hive before use.

  • CVE-2024-46717Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: SHAMPO, Fix incorrect page release Under the following conditions: 1) No skb created yet 2) header_size == 0 (no SHAMPO header) 3) header_index + 1 % MLX5E_SHAMPO_WQ_HEADER_PER_PAGE == 0 (this is the

  • CVE-2024-46714Sep 18, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip wbscl_set_scaler_filter if filter is null Callers can pass null in filter (i.e. from returned from the function wbscl_get_filter_coeffs_16p) and a null check is added to ensure that is not

  • CVE-2024-46707Sep 13, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn't been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the

  • CVE-2024-46702Sep 13, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: thunderbolt: Mark XDomain as unplugged when router is removed I noticed that when we do discrete host router NVM upgrade and it gets hot-removed from the PCIe side as a result of NVM firmware authentication, if

  • CVE-2024-46679MedSep 13, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: ethtool: check device is present when getting link settings A sysfs reader can race with a device reset or removal, attempting to read device state when the device is not actually present. eg: [exception

Page 2 of 72