rpm package
suse/kernel-source&distro=SUSE Linux Enterprise Server 15 SP4-LTSS
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS
Vulnerabilities (2,830)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-47420 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix a potential ttm->sg memory leak Memory is allocated for ttm->sg by kmalloc in kfd_mem_dmamap_userptr, but isn't freed by kfree in kfd_mem_dmaunmap_userptr. Free it! | ||
| CVE-2021-47419 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_taprio: properly cancel timer from taprio_destroy() There is a comment in qdisc_create() about us not calling ops->reset() in some cases. err_out4: /* * Any broken qdiscs that would require a | ||
| CVE-2021-47418 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net_sched: fix NULL deref in fifo_set_limit() syzbot reported another NULL deref in fifo_set_limit() [1] I could repro the issue with : unshare -n tc qd add dev lo root handle 1:0 tbf limit 200000 burst 70000 | ||
| CVE-2021-47417 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: libbpf: Fix memory leak in strset Free struct strset itself, not just its internal parts. | ||
| CVE-2021-47416 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: phy: mdio: fix memory leak Syzbot reported memory leak in MDIO bus interface, the problem was in wrong state logic. MDIOBUS_ALLOCATED indicates 2 states: 1. Bus is only allocated 2. Bus allocated and __mdiob | ||
| CVE-2021-47415 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: iwlwifi: mvm: Fix possible NULL dereference In __iwl_mvm_remove_time_event() check that 'te_data->vif' is NULL before dereferencing it. | ||
| CVE-2021-47414 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: riscv: Flush current cpu icache before other cpus On SiFive Unmatched, I recently fell onto the following BUG when booting: [ 0.000000] ftrace: allocating 36610 entries in 144 pages [ 0.000000] Oops - il | ||
| CVE-2021-47413 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle When passing 'phys' in the devicetree to describe the USB PHY phandle (which is the recommended way according to Documentation/devicetree/bindings/usb/ | ||
| CVE-2021-47412 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: block: don't call rq_qos_ops->done_bio if the bio isn't tracked rq_qos framework is only applied on request based driver, so: 1) rq_qos_done_bio() needn't to be called for bio based driver 2) rq_qos_done_bio( | ||
| CVE-2021-47410 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix svm_migrate_fini warning Device manager releases device-specific resources when a driver disconnects from a device, devm_memunmap_pages and devm_release_mem_region calls in svm_migrate_fini are | ||
| CVE-2021-47409 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: usb: dwc2: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value. | ||
| CVE-2021-47408 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: serialize hash resizes and cleanups Syzbot was able to trigger the following warning [1] No repro found by syzbot yet but I was able to trigger similar issue by having 2 scripts running i | ||
| CVE-2021-47407 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Handle SRCU initialization failure during page track init Check the return of init_srcu_struct(), which can fail due to OOM, when initializing the page track mechanism. Lack of checking leads to a NU | ||
| CVE-2021-47406 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: ext4: add error checking to ext4_ext_replay_set_iblocks() If the call to ext4_map_blocks() fails due to an corrupted file system, ext4_ext_replay_set_iblocks() can get stuck in an infinite loop. This could be | ||
| CVE-2021-47405 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: HID: usbhid: free raw_report buffers in usbhid_stop Free the unsent raw_report buffers when the device is removed. Fixes a memory leak reported by syzbot at: https://syzkaller.appspot.com/bug?id=7b4fa7cb1a7c2d | ||
| CVE-2021-47404 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: HID: betop: fix slab-out-of-bounds Write in betop_probe Syzbot reported slab-out-of-bounds Write bug in hid-betopff driver. The problem is the driver assumes the device must have an input report but some malici | ||
| CVE-2021-47403 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: ipack: ipoctal: fix module reference leak A reference to the carrier module was taken on every open but was only released once when the final reference to the tty struct was dropped. Fix this by taking the mod | ||
| CVE-2021-47402 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: sched: flower: protect fl_walk() with rcu Patch that refactored fl_walk() to use idr_for_each_entry_continue_ul() also removed rcu protection of individual filters which causes following use-after-free whe | ||
| CVE-2021-47401 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: ipack: ipoctal: fix stack information leak The tty driver name is used also after registering the driver and must specifically not be allocated on the stack to avoid leaking information to user space (or trigge | ||
| CVE-2021-47400 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | May 21, 2024 | In the Linux kernel, the following vulnerability has been resolved: net: hns3: do not allow call hns3_nic_net_open repeatedly hns3_nic_net_open() is not allowed to called repeatly, but there is no checking for this. When doing device reset and setup tc concurrently, there is a |
- CVE-2021-47420May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix a potential ttm->sg memory leak Memory is allocated for ttm->sg by kmalloc in kfd_mem_dmamap_userptr, but isn't freed by kfree in kfd_mem_dmaunmap_userptr. Free it!
- CVE-2021-47419May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_taprio: properly cancel timer from taprio_destroy() There is a comment in qdisc_create() about us not calling ops->reset() in some cases. err_out4: /* * Any broken qdiscs that would require a
- CVE-2021-47418May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: net_sched: fix NULL deref in fifo_set_limit() syzbot reported another NULL deref in fifo_set_limit() [1] I could repro the issue with : unshare -n tc qd add dev lo root handle 1:0 tbf limit 200000 burst 70000
- CVE-2021-47417May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: libbpf: Fix memory leak in strset Free struct strset itself, not just its internal parts.
- CVE-2021-47416May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: phy: mdio: fix memory leak Syzbot reported memory leak in MDIO bus interface, the problem was in wrong state logic. MDIOBUS_ALLOCATED indicates 2 states: 1. Bus is only allocated 2. Bus allocated and __mdiob
- CVE-2021-47415May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: iwlwifi: mvm: Fix possible NULL dereference In __iwl_mvm_remove_time_event() check that 'te_data->vif' is NULL before dereferencing it.
- CVE-2021-47414May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: riscv: Flush current cpu icache before other cpus On SiFive Unmatched, I recently fell onto the following BUG when booting: [ 0.000000] ftrace: allocating 36610 entries in 144 pages [ 0.000000] Oops - il
- CVE-2021-47413May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle When passing 'phys' in the devicetree to describe the USB PHY phandle (which is the recommended way according to Documentation/devicetree/bindings/usb/
- CVE-2021-47412May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: block: don't call rq_qos_ops->done_bio if the bio isn't tracked rq_qos framework is only applied on request based driver, so: 1) rq_qos_done_bio() needn't to be called for bio based driver 2) rq_qos_done_bio(
- CVE-2021-47410May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix svm_migrate_fini warning Device manager releases device-specific resources when a driver disconnects from a device, devm_memunmap_pages and devm_release_mem_region calls in svm_migrate_fini are
- CVE-2021-47409May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: usb: dwc2: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.
- CVE-2021-47408May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: serialize hash resizes and cleanups Syzbot was able to trigger the following warning [1] No repro found by syzbot yet but I was able to trigger similar issue by having 2 scripts running i
- CVE-2021-47407May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Handle SRCU initialization failure during page track init Check the return of init_srcu_struct(), which can fail due to OOM, when initializing the page track mechanism. Lack of checking leads to a NU
- CVE-2021-47406May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: ext4: add error checking to ext4_ext_replay_set_iblocks() If the call to ext4_map_blocks() fails due to an corrupted file system, ext4_ext_replay_set_iblocks() can get stuck in an infinite loop. This could be
- CVE-2021-47405May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: HID: usbhid: free raw_report buffers in usbhid_stop Free the unsent raw_report buffers when the device is removed. Fixes a memory leak reported by syzbot at: https://syzkaller.appspot.com/bug?id=7b4fa7cb1a7c2d
- CVE-2021-47404May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: HID: betop: fix slab-out-of-bounds Write in betop_probe Syzbot reported slab-out-of-bounds Write bug in hid-betopff driver. The problem is the driver assumes the device must have an input report but some malici
- CVE-2021-47403May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: ipack: ipoctal: fix module reference leak A reference to the carrier module was taken on every open but was only released once when the final reference to the tty struct was dropped. Fix this by taking the mod
- CVE-2021-47402May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: net: sched: flower: protect fl_walk() with rcu Patch that refactored fl_walk() to use idr_for_each_entry_continue_ul() also removed rcu protection of individual filters which causes following use-after-free whe
- CVE-2021-47401May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: ipack: ipoctal: fix stack information leak The tty driver name is used also after registering the driver and must specifically not be allocated on the stack to avoid leaking information to user space (or trigge
- CVE-2021-47400May 21, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: net: hns3: do not allow call hns3_nic_net_open repeatedly hns3_nic_net_open() is not allowed to called repeatly, but there is no checking for this. When doing device reset and setup tc concurrently, there is a
Page 121 of 142