VYPR

rpm package

suse/kernel-source&distro=SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS

pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSS

Vulnerabilities (2,830)

  • CVE-2022-48973Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: gpio: amd8111: Fix PCI device reference count leak for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the returned pci_dev

  • CVE-2022-48972Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() Kernel fault injection test reports null-ptr-deref as follows: BUG: kernel NULL pointer dereference, address: 0000000000000008 RIP: 0010:cfg802154_n

  • CVE-2022-48971Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix not cleanup led when bt_init fails bt_init() calls bt_leds_init() to register led, but if it fails later, bt_leds_cleanup() is not called to unregister it. This can cause panic if the argument "

  • CVE-2022-48970Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: af_unix: Get user_ns from in_skb in unix_diag_get_exact(). Wei Chen reported a NULL deref in sk_user_ns() [0][1], and Paolo diagnosed the root cause: in unix_diag_get_exact(), the newly allocated skb does not h

  • CVE-2022-48969Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: xen-netfront: Fix NULL sring after live migration A NAPI is setup for each network sring to poll data to kernel The sring with source host is destroyed before live migration and new sring with target host is se

  • CVE-2022-48968Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential memory leak in otx2_init_tc() In otx2_init_tc(), if rhashtable_init() failed, it does not free tc->tc_entries_bitmap which is allocated in otx2_tc_alloc_ent_bitmap().

  • CVE-2022-48967Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: NFC: nci: Bounds check struct nfc_target arrays While running under CONFIG_FORTIFY_SOURCE=y, syzkaller reported: memcpy: detected field-spanning write (size 129) of single field "target->sensf_res" at net/nf

  • CVE-2022-48962Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() The skb is delivered to napi_gro_receive() which may free it, after calling this, dereferencing skb may trigger use-after-free.

  • CVE-2022-48961Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: net: mdio: fix unbalanced fwnode reference count in mdio_device_release() There is warning report about of_node refcount leak while probing mdio device: OF: ERROR: memory leak, expected refcount 1 instead of 2

  • CVE-2022-48960Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() The skb is delivered to napi_gro_receive() which may free it, after calling this, dereferencing skb may trigger use-after-free.

  • CVE-2022-48959Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() When dsa_devlink_region_create failed in sja1105_setup_devlink_regions(), priv->regions is not released.

  • CVE-2022-48956Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: ipv6: avoid use-after-free in ip6_fragment() Blamed commit claimed rcu_read_lock() was held by ip6_fragment() callers. It seems to not be always true, at least for UDP stack. syzbot reported: BUG: KASAN: use

  • CVE-2022-48955Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: net: thunderbolt: fix memory leak in tbnet_open() When tb_ring_alloc_rx() failed in tbnet_open(), ida that allocated in tb_xdomain_alloc_out_hopid() is not released. Add tb_xdomain_release_out_hopid() to the er

  • CVE-2022-48954Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: s390/qeth: fix use-after-free in hsci KASAN found that addr was dereferenced after br2dev_event_work was freed. ================================================================== BUG: KASAN: use-after-free in

  • CVE-2022-48953Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: rtc: cmos: Fix event handler registration ordering issue Because acpi_install_fixed_event_handler() enables the event automatically on success, it is incorrect to call it before the handler routine passed to it

  • CVE-2022-48951Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx() The bounds checks in snd_soc_put_volsw_sx() are only being applied to the first channel, meaning it is possible to write out of bounds values

  • CVE-2022-48949Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: igb: Initialize mailbox message for VF reset When a MAC address is not assigned to the VF, that portion of the message sent to the VF is not set. The memory, however, is allocated from the stack meaning that in

  • CVE-2022-48948Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT t

  • CVE-2022-48947Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix u8 overflow By keep sending L2CAP_CONF_REQ packets, chan->num_conf_rsp increases multiple times and eventually it will wrap around the maximum number (i.e., 255). This patch prevents this

  • CVE-2022-48946Oct 21, 2024
    affected < 5.14.21-150400.24.141.1fixed 5.14.21-150400.24.141.1

    In the Linux kernel, the following vulnerability has been resolved: udf: Fix preallocation discarding at indirect extent boundary When preallocation extent is the first one in the extent block, the code would corrupt extent tree header instead. Fix the problem and use udf_delet

Page 95 of 142