VYPR

rpm package

suse/kernel-rt_debug&distro=SUSE Linux Enterprise Real Time 12 SP5

pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5

Vulnerabilities (1,429)

  • CVE-2024-41064Jul 29, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: powerpc/eeh: avoid possible crash when edev->pdev changes If a PCI device is removed during eeh_pe_report_edev(), edev->pdev will change and can cause a crash, hold the PCI rescan/remove lock while taking a cop

  • CVE-2024-41063Jul 29, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() syzbot is reporting that calling hci_release_dev() from hci_error_reset() due to hci_dev_put() from hci_error_reset() can cause deadlock at destro

  • CVE-2024-41062Jul 29, 2024
    affected < 4.12.14-10.200.1fixed 4.12.14-10.200.1

    In the Linux kernel, the following vulnerability has been resolved: bluetooth/l2cap: sync sock recv cb and release The problem occurs between the system call to close the sock and hci_rx_work, where the former releases the sock and the latter accesses it without lock protection

  • CVE-2024-41060Jul 29, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: drm/radeon: check bo_va->bo is non-NULL before using it The call to radeon_vm_clear_freed might clear bo_va->bo, so we have to check it before dereferencing it.

  • CVE-2024-41059Jul 29, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix uninit-value in copy_name [syzbot reported] BUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160 sized_strscpy+0xc4/0x160 copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411 hfsplus_listxattr+0x11e9/0x

  • CVE-2024-41048Jul 29, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: skmsg: Skip zero length skb in sk_msg_recvmsg When running BPF selftests (./test_progs -t sockmap_basic) on a Loongarch platform, the following kernel panic occurs: [...] Oops[#1]: CPU: 22 PID: 2824 Comm

  • CVE-2024-41044Jul 29, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: ppp: reject claimed-as-LCP but actually malformed packets Since 'ppp_async_encode()' assumes valid LCP packets (with code from 1 to 7 inclusive), add 'ppp_check_packet()' to ensure that LCP packet has an actual

  • CVE-2024-41035Jul 29, 2024
    affected < 4.12.14-10.200.1fixed 4.12.14-10.200.1

    In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor Syzbot has identified a bug in usbcore (see the Closes: tag below) caused by our assumption that the reserved bits in an endpoin

  • CVE-2024-41020Jul 29, 2024
    affected < 4.12.14-10.200.1fixed 4.12.14-10.200.1

    In the Linux kernel, the following vulnerability has been resolved: filelock: Fix fcntl/close race recovery compat path When I wrote commit 3cad1bc01041 ("filelock: Remove locks reliably when fcntl/close race is detected"), I missed that there are two copies of the code I was p

  • CVE-2024-41016MedJul 29, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() xattr in ocfs2 maybe 'non-indexed', which saved with additional space requested. It's better to check if the memory is out of bound before me

  • CVE-2024-41015Jul 29, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: ocfs2: add bounds checking to ocfs2_check_dir_entry() This adds sanity checks for ocfs2_dir_entry to make sure all members of ocfs2_dir_entry don't stray beyond valid memory region.

  • CVE-2024-41014Jul 29, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: xfs: add bounds checking to xlog_recover_process_data There is a lack of verification of the space occupied by fixed members of xlog_op_header in the xlog_recover_process_data. We can create a crafted image to

  • CVE-2024-41091Jul 29, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tun_xdp_one() path, which could cause a corrupted skb to be sent downstack. Even be

  • CVE-2024-41090Jul 29, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Ev

  • CVE-2024-41012Jul 23, 2024
    affected < 4.12.14-10.200.1fixed 4.12.14-10.200.1

    In the Linux kernel, the following vulnerability has been resolved: filelock: Remove locks reliably when fcntl/close race is detected When fcntl_setlk() races with close(), it removes the created lock with do_lock_file_wait(). However, LSMs can allow the first do_lock_file_wait

  • CVE-2022-48865Jul 16, 2024
    affected < 4.12.14-10.200.1fixed 4.12.14-10.200.1

    In the Linux kernel, the following vulnerability has been resolved: tipc: fix kernel panic when enabling bearer When enabling a bearer on a node, a kernel panic is observed: [ 4.498085] RIP: 0010:tipc_mon_prep+0x4e/0x130 [tipc] ... [ 4.520030] Call Trace: [ 4.520689]

  • CVE-2022-48863Jul 16, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: mISDN: Fix memory leak in dsp_pipeline_build() dsp_pipeline_build() allocates dup pointer by kstrdup(cfg), but then it updates dup variable by strsep(&dup, "|"). As a result when it calls kfree(dup), the dup va

  • CVE-2022-48860Jul 16, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: ethernet: Fix error handling in xemaclite_of_probe This node pointer is returned by of_parse_phandle() with refcount incremented in this function. Calling of_node_put() to avoid the refcount leak. As the remove

  • CVE-2022-48857Jul 16, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: NFC: port100: fix use-after-free in port100_send_complete Syzbot reported UAF in port100_send_complete(). The root case is in missing usb_kill_urb() calls on error handling path of ->probe function. port100_se

  • CVE-2022-48855Jul 16, 2024
    affected < 4.12.14-10.197.1fixed 4.12.14-10.197.1

    In the Linux kernel, the following vulnerability has been resolved: sctp: fix kernel-infoleak for SCTP sockets syzbot reported a kernel infoleak [1] of 4 bytes. After analysis, it turned out r->idiag_expires is not initialized if inet_sctp_diag_fill() calls inet_diag_msg_commo

Page 9 of 72