VYPR

rpm package

suse/kernel-source&distro=SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS

pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSS

Vulnerabilities (2,830)

  • CVE-2022-48693May 3, 2024
    affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1

    In the Linux kernel, the following vulnerability has been resolved: soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs In brcmstb_pm_probe(), there are two kinds of leak bugs: (1) we need to add of_node_put() when for_each__matching_node() breaks (2) we need to add

  • CVE-2022-48692May 3, 2024
    affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/srp: Set scmnd->result only when scmnd is not NULL This change fixes the following kernel NULL pointer dereference which is reproduced by blktests srp/007 occasionally. BUG: kernel NULL pointer dereferenc

  • CVE-2022-48688May 3, 2024
    affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1

    In the Linux kernel, the following vulnerability has been resolved: i40e: Fix kernel crash during module removal The driver incorrectly frees client instance and subsequent i40e module removal leads to kernel crash. Reproducer: 1. Do ethtool offline test followed immediately b

  • CVE-2022-48687May 3, 2024
    affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1

    In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix out-of-bounds read when setting HMAC data. The SRv6 layer allows defining HMAC data that can later be used to sign IPv6 Segment Routing Headers. This configuration is realised via netlink through

  • CVE-2022-48686May 3, 2024
    affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1

    In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix UAF when detecting digest errors We should also bail from the io_work loop when we set rd_enabled to true, so we don't attempt to read data from the socket when the TCP stream is already out-of-sy

  • CVE-2022-48675May 3, 2024
    affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1

    In the Linux kernel, the following vulnerability has been resolved: IB/core: Fix a nested dead lock as part of ODP flow Fix a nested dead lock as part of ODP flow by using mmput_async(). From the below call trace [1] can see that calling mmput() once we have the umem_odp->umem

  • CVE-2022-48673May 3, 2024
    affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1

    In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix possible access to freed memory in link clear After modifying the QP to the Error state, all RX WR would be completed with WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not wait for

  • CVE-2022-48672May 3, 2024
    affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1

    In the Linux kernel, the following vulnerability has been resolved: of: fdt: fix off-by-one error in unflatten_dt_nodes() Commit 78c44d910d3e ("drivers/of: Fix depth when unflattening devicetree") forgot to fix up the depth check in the loop body in unflatten_dt_nodes() which m

  • CVE-2022-48671May 3, 2024
    affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1

    In the Linux kernel, the following vulnerability has been resolved: cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() syzbot is hitting percpu_rwsem_assert_held(&cpu_hotplug_lock) warning at cpuset_attach() [1], for commit 4f7e7236435ca0ab ("cgroup: Fix threadgro

  • CVE-2024-27389May 1, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: pstore: inode: Only d_invalidate() is needed Unloading a modular pstore backend with records in pstorefs would trigger the dput() double-drop warning: WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0

  • CVE-2024-27043May 1, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: media: edia: dvbdev: fix a use-after-free In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed in several error-handling paths. However, *pdvbdev is not set to NULL after dvbdev's deallocatio

  • CVE-2024-26935MedMay 1, 2024
    affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix unremoved procfs host directory regression Commit fc663711b944 ("scsi: core: Remove the /proc/scsi/${proc_name} directory earlier") fixed a bug related to modules loading/unloading, by adding a

  • CVE-2024-26976May 1, 2024
    affected < 5.14.21-150400.24.128.1fixed 5.14.21-150400.24.128.1

    In the Linux kernel, the following vulnerability has been resolved: KVM: Always flush async #PF workqueue when vCPU is being destroyed Always flush the per-vCPU async #PF workqueue when a vCPU is clearing its completion queue, e.g. when a VM and all its vCPUs is being destroyed

  • CVE-2024-26930May 1, 2024
    affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix double free of the ha->vp_map pointer Coverity scan reported potential risk of double free of the pointer ha->vp_map. ha->vp_map was freed in qla2x00_mem_alloc(), and again freed in function

  • CVE-2022-48668Apr 28, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: smb3: fix temporary data corruption in collapse range collapse range doesn't discard the affected cached region so can risk temporarily corrupting the file data. This fixes xfstest generic/031 I also decided t

  • CVE-2022-48667Apr 28, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: smb3: fix temporary data corruption in insert range insert range doesn't discard the affected cached region so can risk temporarily corrupting file data. Also includes some minor cleanup (avoiding rereading in

  • CVE-2022-48664Apr 28, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: fix hang during unmount when stopping a space reclaim worker Often when running generic/562 from fstests we can hang during unmount, resulting in a trace like this: Sep 07 11:52:00 debian9 unknown: ru

  • CVE-2022-48663Apr 28, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: gpio: mockup: fix NULL pointer dereference when removing debugfs We now remove the device's debugfs entries when unbinding the driver. This now causes a NULL-pointer dereference on module exit because the platf

  • CVE-2022-48662Apr 28, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires tha

  • CVE-2022-48660Apr 28, 2024
    affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1

    In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully When running gpio test on nxp-ls1028 platform with below command gpiomon --num-events=3 --rising-edge gpiochip1 25 There will be a warning

Page 126 of 142