VYPR

rpm package

suse/kernel-rt&distro=SUSE Real Time Module 15 SP6

pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP6

Vulnerabilities (3,740)

  • CVE-2024-26637Mar 18, 2024
    affected < 6.4.0-150600.10.8.3fixed 6.4.0-150600.10.8.3

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: rely on mac80211 debugfs handling for vif mac80211 started to delete debugfs entries in certain cases, causing a ath11k to crash when it tried to delete the entries later. Fix this by relying on m

  • CVE-2024-26636Mar 18, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: llc: make llc_ui_sendmsg() more robust against bonding changes syzbot was able to trick llc_ui_sendmsg(), allocating an skb with no headroom, but subsequently trying to push 14 bytes of Ethernet header [1] Lik

  • CVE-2024-26635Mar 18, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: llc: Drop support for ETH_P_TR_802_2. syzbot reported an uninit-value bug below. [0] llc supports ETH_P_802_2 (0x0004) and used to support ETH_P_TR_802_2 (0x0011), and syzbot abused the latter to trigger the b

  • CVE-2024-26634Mar 18, 2024
    affected < 6.4.0-150600.10.34.1fixed 6.4.0-150600.10.34.1

    In the Linux kernel, the following vulnerability has been resolved: net: fix removing a namespace with conflicting altnames Mark reports a BUG() when a net namespace is removed. kernel BUG at net/core/dev.c:11520! Physical interfaces moved outside of init_net get "refunde

  • CVE-2023-52616Mar 18, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init When the mpi_ec_ctx structure is initialized, some fields are not cleared, causing a crash when referencing the field when the structure was releas

  • CVE-2024-26633Mar 18, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() syzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken. Reading frag_off can only be done if we pulled enough bytes to skb->hea

  • CVE-2024-26632Mar 18, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: block: Fix iterating over an empty bio with bio_for_each_folio_all If the bio contains no data, bio_first_folio() calls page_folio() on a NULL pointer and oopses. Move the test that we've reached the end of th

  • CVE-2024-26631Mar 18, 2024
    affected < 6.4.0-150600.10.8.3fixed 6.4.0-150600.10.8.3

    In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work idev->mc_ifc_count can be written over without proper locking. Originally found by syzbot [1], fix this issue by encapsulating calls to mld_ifc_stop_wo

  • CVE-2023-52610Mar 18, 2024
    affected < 6.4.0-150600.10.14.1fixed 6.4.0-150600.10.14.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: act_ct: fix skb leak and crash on ooo frags act_ct adds skb->users before defragmentation. If frags arrive in order, the last frag's reference is reset in: inet_frag_reasm_prepare skb_morph w

  • CVE-2024-26625Mar 6, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: llc: call sock_orphan() at release time syzbot reported an interesting trace [1] caused by a stale sk->sk_wq pointer in a closed llc socket. In commit ff7b11aa481f ("net: socket: set sock->sk to NULL after cal

  • CVE-2024-26623Mar 6, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: pds_core: Prevent race issues involving the adminq There are multiple paths that can result in using the pdsc's adminq. [1] pdsc_adminq_isr and the resulting work from queue_work(), i.e. pdsc_work_thread()

  • CVE-2023-52581Mar 2, 2024
    affected < 6.4.0-150600.10.8.3fixed 6.4.0-150600.10.8.3

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix memleak when more than 255 elements expired When more than 255 elements expired we're supposed to switch to a new gc container structure. This never happens: u8 type will wrap before

  • CVE-2023-52503Mar 2, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: tee: amdtee: fix use-after-free vulnerability in amdtee_close_session There is a potential race condition in amdtee_close_session that may cause use-after-free in amdtee_open_session. For instance, if a session

  • CVE-2024-26615Feb 29, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: net/smc: fix illegal rmb_desc access in SMC-D connection dump A crash was found when dumping SMC-D connections. It can be reproduced by following steps: - run nginx/wrk test: smc_run nginx smc_run wrk -t 1

  • CVE-2024-26614Feb 29, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once When I run syz's reproduction C program locally, it causes the following issue: pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0! WARNING: CPU:

  • CVE-2024-26611Feb 29, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: xsk: fix usage of multi-buffer BPF helpers for ZC XDP Currently when packet is shrunk via bpf_xdp_adjust_tail() and memory type is set to MEM_TYPE_XSK_BUFF_POOL, null ptr dereference happens: [1136314.192256]

  • CVE-2023-52489Feb 29, 2024
    affected < 6.4.0-150600.10.8.3fixed 6.4.0-150600.10.8.3

    In the Linux kernel, the following vulnerability has been resolved: mm/sparsemem: fix race in accessing memory_section->usage The below race is observed on a PFN which falls into the device memory region with the system memory configuration where PFN's are such that [ZONE_NORMA

  • CVE-2023-52472Feb 25, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: rsa - add a check for allocation failure Static checkers insist that the mpi_alloc() allocation can fail so add a check to prevent a NULL dereference. Small allocations like this can't actually fail in

  • CVE-2024-26601Feb 24, 2024
    affected < 6.4.0-150600.10.5.1fixed 6.4.0-150600.10.5.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: regenerate buddy after block freeing failed if under fc replay This mostly reverts commit 6bd97bf273bd ("ext4: remove redundant mb_regenerate_buddy()") and reintroduces mb_regenerate_buddy(). Based on cod

  • CVE-2024-26596MedFeb 23, 2024
    affected < 6.4.0-150600.10.20.1fixed 6.4.0-150600.10.20.1

    In the Linux kernel, the following vulnerability has been resolved: net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events After the blamed commit, we started doing this dereference for every NETDEV_CHANGEUPPER and NETDEV_PRECHANGEUPPER event in the sy

Page 186 of 187