VYPR

rpm package

suse/kernel-rt_debug&distro=SUSE Linux Enterprise Real Time 12 SP5

pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5

Vulnerabilities (1,429)

  • CVE-2022-48788Jul 16, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: nvme-rdma: fix possible use-after-free in transport error_recovery work While nvme_rdma_submit_async_event_work is checking the ctrl and queue state before preparing the AER command and scheduling io_work, in o

  • CVE-2022-48786Jul 16, 2024
    affected < 4.12.14-10.200.1fixed 4.12.14-10.200.1

    In the Linux kernel, the following vulnerability has been resolved: vsock: remove vsock from connected table when connect is interrupted by a signal vsock_connect() expects that the socket could already be in the TCP_ESTABLISHED state when the connecting task wakes up with a si

  • CVE-2021-47622Jul 16, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: Fix a deadlock in the error handler The following deadlock has been observed on a test setup: - All tags allocated - The SCSI error handler calls ufshcd_eh_host_reset_handler() - ufshcd_eh_host

  • CVE-2022-48775Jul 16, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj kobject_init_and_add() takes reference even when it fails. According to the doc of kobject_init_and_add(): If this function returns an error, ko

  • CVE-2023-52885Jul 14, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() After the listener svc_sock is freed, and before invoking svc_tcp_accept() for the established child sock, there is a window that the newsock retaining a freed lis

  • CVE-2024-41000HigJul 12, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: block/ioctl: prefer different overflow check Running syzkaller with the newly reintroduced signed integer overflow sanitizer shows this report: [ 62.982337] ------------[ cut here ]------------ [ 62.985692

  • CVE-2024-40995MedJul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() syzbot found hanging tasks waiting on rtnl_lock [1] A reproducer is available in the syzbot bug. When a request to add multiple actions

  • CVE-2024-40984MedJul 12, 2024
    affected < 4.12.14-10.200.1fixed 4.12.14-10.200.1

    In the Linux kernel, the following vulnerability has been resolved: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." Undo the modifications made in commit d410ee5109a1 ("ACPICA: avoid "Info: mapping multiple BARs. Your kernel is fine.""). The ini

  • CVE-2024-40978HigJul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: qedi: Fix crash while reading debugfs attribute The qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly on a __user pointer, which results into the crash. To fix this issue, use a smal

  • CVE-2024-40959MedJul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() ip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly. syzbot reported: Oops: general protection fault, probably for non-canonica

  • CVE-2024-40942MedJul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects The hwmp code use objects of type mesh_preq_queue, added to a list in ieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath gets de

  • CVE-2024-40941MedJul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't read past the mfuart notifcation In case the firmware sends a notification that claims it has more data than it has, we will read past that was allocated for the notification. Remove t

  • CVE-2024-40912MedJul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() The ieee80211_sta_ps_deliver_wakeup() function takes sta->ps_lock to synchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from soft

  • CVE-2024-39509MedJul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: HID: core: remove unnecessary WARN_ON() in implement() Syzkaller hit a warning [1] in a call to implement() when trying to write a value into a field of smaller size in an output report. Since implement() alre

  • CVE-2024-40999Jul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: net: ena: Add validation for completion descriptors consistency Validate that `first` flag is set only for the first descriptor in multi-buffer packets. In case of an invalid descriptor, a reset will occur. A n

  • CVE-2024-40998Jul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() In the following concurrency we will access the uninitialized rs->lock: ext4_fill_super ext4_register_sysfs // sysfs registered

  • CVE-2024-40990Jul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Add check for srq max_sge attribute max_sge attribute is passed by the user, and is inserted and used unchecked, so verify that the value doesn't exceed maximum allowed value before using it.

  • CVE-2024-40988Jul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: drm/radeon: fix UBSAN warning in kv_dpm.c Adds bounds check for sumo_vid_mapping_entry.

  • CVE-2024-40987Jul 12, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix UBSAN warning in kv_dpm.c Adds bounds check for sumo_vid_mapping_entry.

  • CVE-2024-40973Jul 12, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: media: mtk-vcodec: potential null pointer deference in SCP The return value of devm_kzalloc() needs to be checked to avoid NULL pointer deference. This is similar to CVE-2022-3113.

Page 11 of 72