VYPR

rpm package

suse/kernel-rt_debug&distro=SUSE Real Time Module 15 SP7

pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP7

Vulnerabilities (118)

  • CVE-2024-54458Feb 27, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: bsg: Set bsg_queue to NULL after removal Currently, this does not cause any issues, but I believe it is necessary to set bsg_queue to NULL after removing it to prevent potential use-after-free (UAF)

  • CVE-2024-58001Feb 27, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle a symlink read error correctly Patch series "Convert ocfs2 to use folios". Mark did a conversion of ocfs2 to use folios and sent it to me as a giant patch for review ;-) So I've redone it as ind

  • CVE-2025-21707Feb 27, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: mptcp: consolidate suboption status MPTCP maintains the received sub-options status is the bitmask carrying the received suboptions and in several bitfields carrying per suboption additional info. Zeroing the

  • CVE-2024-57998Feb 27, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: OPP: add index check to assert to avoid buffer overflow in _read_freq() Pass the freq index to the assert function to make sure we do not read a freq out of the opp->rates[] table when called from the indexed v

  • CVE-2025-21702HigFeb 18, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 Expected behaviour: In case we reach scheduler's limit, pfifo_tail_enqueue() will drop a packet in scheduler's queue and decrease scheduler's qlen by one

  • CVE-2025-21683MedJan 31, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: Fix bpf_sk_select_reuseport() memory leak As pointed out in the original comment, lookup in sockmap can return a TCP ESTABLISHED socket. Such TCP socket may have had SO_ATTACH_REUSEPORT_EBPF set before it

  • CVE-2025-21648MedJan 19, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing has

  • CVE-2024-56702Dec 28, 2024
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: Mark raw_tp arguments with PTR_MAYBE_NULL Arguments to a raw tracepoint are tagged as trusted, which carries the semantics that the pointer will be non-NULL. However, in certain cases, a raw tracepoint ar

  • CVE-2024-56641Dec 27, 2024
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: net/smc: initialize close_work early to avoid warning We encountered a warning that close_work was canceled before initialization. WARNING: CPU: 7 PID: 111103 at kernel/workqueue.c:3047 __flush_work+0x19e/0x

  • CVE-2024-50223Nov 9, 2024
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: sched/numa: Fix the potential null pointer dereference in task_numa_work() When running stress-ng-vm-segv test, we found a null pointer dereference error in task_numa_work(). Here is the backtrace: [323676.0

  • CVE-2024-50106Nov 5, 2024
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: nfsd: fix race between laundromat and free_stateid There is a race between laundromat handling of revoked delegations and a client sending free_stateid operation. Laundromat thread finds that delegation has exp

  • CVE-2024-50083Oct 29, 2024
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: tcp: fix mptcp DSS corruption due to large pmtu xmit Syzkaller was able to trigger a DSS corruption: TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. ------------[ c

  • CVE-2024-46865HigSep 27, 2024
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: fou: fix initialization of grc The grc must be initialize first. There can be a condition where if fou is NULL, goto out will be executed and grc would be used uninitialized.

  • CVE-2024-46763Sep 18, 2024
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: fou: Fix null-ptr-deref in GRO. We observed a null-ptr-deref in fou_gro_receive() while shutting down a host. [0] The NULL pointer is sk->sk_user_data, and the offset 8 is of protocol in struct fou. When fou

  • CVE-2024-46713Sep 13, 2024
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment th

  • CVE-2024-35840May 17, 2024
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() subflow_finish_connect() uses four fields (backup, join_id, thmac, none) that may contain garbage unless OPTION_MPTCP_MPJ_SYNACK has been set in mp

  • CVE-2024-27415May 17, 2024
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: bridge: confirm multicast packets before passing them up the stack conntrack nf_confirm logic cannot handle cloned skbs referencing the same nf_conn entry, which will happen for multicast (broadcast)

  • CVE-2024-27018May 1, 2024
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: skip conntrack input hook for promisc packets For historical reasons, when bridge device is in promisc mode, packets that are directed to the taps follow bridge input hook path. This pa

Page 6 of 6