VYPR

rpm package

suse/kernel-rt_debug&distro=SUSE Linux Enterprise Real Time 12 SP5

pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5

Vulnerabilities (1,429)

  • CVE-2023-52864May 21, 2024
    affected < 4.12.14-10.188.1fixed 4.12.14-10.188.1

    In the Linux kernel, the following vulnerability has been resolved: platform/x86: wmi: Fix opening of char device Since commit fa1f68db6ca7 ("drivers: misc: pass miscdevice pointer via file private data"), the miscdevice stores a pointer to itself inside filp->private_data, whi

  • CVE-2023-52855May 21, 2024
    affected < 4.12.14-10.191.1fixed 4.12.14-10.191.1

    In the Linux kernel, the following vulnerability has been resolved: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency In _dwc2_hcd_urb_enqueue(), "urb->hcpriv = NULL" is executed without holding the lock "hsotg->lock". In _dwc2_hcd_urb_dequeue():

  • CVE-2023-52845May 21, 2024
    affected < 4.12.14-10.191.1fixed 4.12.14-10.191.1

    In the Linux kernel, the following vulnerability has been resolved: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING syzbot reported the following uninit-value access issue [1]: ===================================================== BUG: KMSAN: uninit-value in

  • CVE-2023-52843May 21, 2024
    affected < 4.12.14-10.191.1fixed 4.12.14-10.191.1

    In the Linux kernel, the following vulnerability has been resolved: llc: verify mac len before reading mac header LLC reads the mac header with eth_hdr without verifying that the skb has an Ethernet header. Syzbot was able to enter llc_rcv on a tun device. Tun can insert packe

  • CVE-2023-52835May 21, 2024
    affected < 4.12.14-10.191.1fixed 4.12.14-10.191.1

    In the Linux kernel, the following vulnerability has been resolved: perf/core: Bail out early if the request AUX area is out of bound When perf-record with a large AUX area, e.g 4GB, it fails with: #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1 failed to mmap with

  • CVE-2023-52834May 21, 2024
    affected < 4.12.14-10.191.1fixed 4.12.14-10.191.1

    In the Linux kernel, the following vulnerability has been resolved: atl1c: Work around the DMA RX overflow issue This is based on alx driver commit 881d0327db37 ("net: alx: Work around the DMA RX overflow issue"). The alx and atl1c drivers had RX overflow error which was why a

  • CVE-2023-52832May 21, 2024
    affected < 4.12.14-10.191.1fixed 4.12.14-10.191.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't return unset power in ieee80211_get_tx_power() We can get a UBSAN warning if ieee80211_get_tx_power() returns the INT_MIN value mac80211 internally uses for "unset power level". UBSAN: s

  • CVE-2023-52821May 21, 2024
    affected < 4.12.14-10.188.1fixed 4.12.14-10.188.1

    In the Linux kernel, the following vulnerability has been resolved: drm/panel: fix a possible null pointer dereference In versatile_panel_get_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a NULL pointer dereference on failure of drm_m

  • CVE-2023-52819May 21, 2024
    affected < 4.12.14-10.194.1fixed 4.12.14-10.194.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga For pptable structs that use flexible array sizes, use flexible arrays.

  • CVE-2023-52818May 21, 2024
    affected < 4.12.14-10.194.1fixed 4.12.14-10.194.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 For pptable structs that use flexible array sizes, use flexible arrays.

  • CVE-2023-52817May 21, 2024
    affected < 4.12.14-10.194.1fixed 4.12.14-10.194.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL In certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_r

  • CVE-2023-52811May 21, 2024
    affected < 4.12.14-10.191.1fixed 4.12.14-10.191.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool In practice the driver should never send more commands than are allocated to a queue's event pool. In the unlikely event that this happens, the cod

  • CVE-2023-52809May 21, 2024
    affected < 4.12.14-10.191.1fixed 4.12.14-10.191.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() fc_lport_ptp_setup() did not check the return value of fc_rport_create() which can return NULL and would cause a NULL pointer derefere

  • CVE-2023-52808May 21, 2024
    affected < 4.12.14-10.191.1fixed 4.12.14-10.191.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs If init debugfs failed during device registration due to memory allocation failure, debugfs_remove_recursive() is called, after which debug

  • CVE-2023-52803May 21, 2024
    affected < 4.12.14-10.188.1fixed 4.12.14-10.188.1

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries RPC client pipefs dentries cleanup is in separated rpc_remove_pipedir() workqueue,which takes care about pipefs superblock locking. In some special sc

  • CVE-2023-52796May 21, 2024
    affected < 4.12.14-10.188.1fixed 4.12.14-10.188.1

    In the Linux kernel, the following vulnerability has been resolved: ipvlan: add ipvlan_route_v6_outbound() helper Inspired by syzbot reports using a stack of multiple ipvlan devices. Reduce stack size needed in ipvlan_process_v6_outbound() by moving the flowi6 struct used for

  • CVE-2023-52784May 21, 2024
    affected < 4.12.14-10.191.1fixed 4.12.14-10.191.1

    In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave() Commit 9eed321cde22 ("net: lapbether: only support ethernet devices") has been able to keep syzbot away from net/lapb, until today. In the following splat [1],

  • CVE-2023-52781May 21, 2024
    affected < 4.12.14-10.188.1fixed 4.12.14-10.188.1

    In the Linux kernel, the following vulnerability has been resolved: usb: config: fix iteration issue in 'usb_get_bos_descriptor()' The BOS descriptor defines a root descriptor and is the base descriptor for accessing a family of related descriptors. Function 'usb_get_bos_descr

  • CVE-2023-52774May 21, 2024
    affected < 4.12.14-10.188.1fixed 4.12.14-10.188.1

    In the Linux kernel, the following vulnerability has been resolved: s390/dasd: protect device queue against concurrent access In dasd_profile_start() the amount of requests on the device queue are counted. The access to the device queue is unprotected against concurrent access.

  • CVE-2023-52766May 21, 2024
    affected < 4.12.14-10.203.1fixed 4.12.14-10.203.1

    In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler Do not loop over ring headers in hci_dma_irq_handler() that are not allocated and enabled in hci_dma_init(). Otherwise out of bounds access wil

Page 20 of 72