rpm package
suse/kernel-source&distro=SUSE Manager Server 4.3
pkg:rpm/suse/kernel-source&distro=SUSE%20Manager%20Server%204.3
Vulnerabilities (1,907)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-52474 | — | < 5.14.21-150400.24.116.1 | 5.14.21-150400.24.116.1 | Feb 26, 2024 | In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests hfi1 user SDMA request processing has two bugs that can cause data corruption for user SDMA requests that have multiple payload iovecs whe | ||
| CVE-2019-25162 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 26, 2024 | In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free Free the adap structure only after we are done using it. This patch just moves the put_device() down a bit to avoid the use after free. [wsa: added comment to the code, adde | ||
| CVE-2022-48626 | — | < 5.14.21-150400.24.116.1 | 5.14.21-150400.24.116.1 | Feb 25, 2024 | In the Linux kernel, the following vulnerability has been resolved: moxart: fix potential use-after-free on remove path It was reported that the mmc host structure could be accessed after it was freed in moxart_remove(), so fix this by saving the base register of the device and | ||
| CVE-2023-52470 | — | < 5.14.21-150400.24.116.1 | 5.14.21-150400.24.116.1 | Feb 25, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() check the alloc_workqueue return value in radeon_crtc_init() to avoid null-ptr-deref. | ||
| CVE-2023-52469 | — | < 5.14.21-150400.24.116.1 | 5.14.21-150400.24.116.1 | Feb 25, 2024 | In the Linux kernel, the following vulnerability has been resolved: drivers/amd/pm: fix a use-after-free in kv_parse_power_table When ps allocated by kzalloc equals to NULL, kv_parse_power_table frees adev->pm.dpm.ps that allocated before. However, after the control flow goes t | ||
| CVE-2023-52467 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 25, 2024 | In the Linux kernel, the following vulnerability has been resolved: mfd: syscon: Fix null pointer dereference in of_syscon_register() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. | ||
| CVE-2024-26603 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 24, 2024 | In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Stop relying on userspace for info to fault in xsave buffer Before this change, the expected size of the user space buffer was taken from fx_sw->xstate_size. fx_sw->xstate_size can be changed from user | ||
| CVE-2024-26602 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 24, 2024 | In the Linux kernel, the following vulnerability has been resolved: sched/membarrier: reduce the ability to hammer on sys_membarrier On some systems, sys_membarrier can be very expensive, causing overall slowdowns for everything. So put a lock on the path in order to serialize | ||
| CVE-2024-26601 | — | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Feb 24, 2024 | In the Linux kernel, the following vulnerability has been resolved: ext4: regenerate buddy after block freeing failed if under fc replay This mostly reverts commit 6bd97bf273bd ("ext4: remove redundant mb_regenerate_buddy()") and reintroduces mb_regenerate_buddy(). Based on cod | ||
| CVE-2024-26600 | — | < 5.14.21-150400.24.116.1 | 5.14.21-150400.24.116.1 | Feb 24, 2024 | In the Linux kernel, the following vulnerability has been resolved: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP If the external phy working together with phy-omap-usb2 does not implement send_srp(), we may still attempt to call it. This can happen on an idle Et | ||
| CVE-2024-26598 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 23, 2024 | In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache There is a potential UAF scenario in the case of an LPI translation cache hit racing with an operation that invalidates the cache, such as a DI | ||
| CVE-2024-26595 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 23, 2024 | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path When calling mlxsw_sp_acl_tcam_region_destroy() from an error path after failing to attach the region to an ACL group, we hit a NULL pointer | ||
| CVE-2023-52464 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 23, 2024 | In the Linux kernel, the following vulnerability has been resolved: EDAC/thunderx: Fix possible out-of-bounds string access Enabling -Wstringop-overflow globally exposes a warning for a common bug in the usage of strncat(): drivers/edac/thunderx_edac.c: In function 'thunderx | ||
| CVE-2023-52463 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 23, 2024 | In the Linux kernel, the following vulnerability has been resolved: efivarfs: force RO when remounting if SetVariable is not supported If SetVariable at runtime is not supported by the firmware we never assign a callback for that function. At the same time mount the efivarfs as | ||
| CVE-2023-52457 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 23, 2024 | In the Linux kernel, the following vulnerability has been resolved: serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed Returning an error code from .remove() makes the driver core emit the little helpful error message: remove callback return | ||
| CVE-2023-52456 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 23, 2024 | In the Linux kernel, the following vulnerability has been resolved: serial: imx: fix tx statemachine deadlock When using the serial port as RS485 port, the tx statemachine is used to control the RTS pin to drive the RS485 transceiver TX_EN pin. When the TTY port is closed in th | ||
| CVE-2023-52454 | — | < 5.14.21-150400.24.116.1 | 5.14.21-150400.24.116.1 | Feb 23, 2024 | In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length If the host sends an H2CData command with an invalid DATAL, the kernel may crash in nvmet_tcp_build_pdu_iovec(). Unable to handle kernel | ||
| CVE-2024-26593 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 23, 2024 | In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Fix block process call transactions According to the Intel datasheets, software must reset the block buffer index twice for block process call transactions: once before writing the outgoing data to t | ||
| CVE-2023-52447 | Med | 6.7 | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 22, 2024 | In the Linux kernel, the following vulnerability has been resolved: bpf: Defer the free of inner map when necessary When updating or deleting an inner map in map array or map htab, the map may still be accessed by non-sleepable program or sleepable program. However bpf_map_fd_p | |
| CVE-2024-26591 | — | < 5.14.21-150400.24.111.1 | 5.14.21-150400.24.111.1 | Feb 22, 2024 | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix re-attachment branch in bpf_tracing_prog_attach The following case can cause a crash due to missing attach_btf: 1) load rawtp program 2) load fentry program with rawtp as target_fd 3) create tracing l |
- CVE-2023-52474Feb 26, 2024affected < 5.14.21-150400.24.116.1fixed 5.14.21-150400.24.116.1
In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests hfi1 user SDMA request processing has two bugs that can cause data corruption for user SDMA requests that have multiple payload iovecs whe
- CVE-2019-25162Feb 26, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free Free the adap structure only after we are done using it. This patch just moves the put_device() down a bit to avoid the use after free. [wsa: added comment to the code, adde
- CVE-2022-48626Feb 25, 2024affected < 5.14.21-150400.24.116.1fixed 5.14.21-150400.24.116.1
In the Linux kernel, the following vulnerability has been resolved: moxart: fix potential use-after-free on remove path It was reported that the mmc host structure could be accessed after it was freed in moxart_remove(), so fix this by saving the base register of the device and
- CVE-2023-52470Feb 25, 2024affected < 5.14.21-150400.24.116.1fixed 5.14.21-150400.24.116.1
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() check the alloc_workqueue return value in radeon_crtc_init() to avoid null-ptr-deref.
- CVE-2023-52469Feb 25, 2024affected < 5.14.21-150400.24.116.1fixed 5.14.21-150400.24.116.1
In the Linux kernel, the following vulnerability has been resolved: drivers/amd/pm: fix a use-after-free in kv_parse_power_table When ps allocated by kzalloc equals to NULL, kv_parse_power_table frees adev->pm.dpm.ps that allocated before. However, after the control flow goes t
- CVE-2023-52467Feb 25, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: mfd: syscon: Fix null pointer dereference in of_syscon_register() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.
- CVE-2024-26603Feb 24, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Stop relying on userspace for info to fault in xsave buffer Before this change, the expected size of the user space buffer was taken from fx_sw->xstate_size. fx_sw->xstate_size can be changed from user
- CVE-2024-26602Feb 24, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: sched/membarrier: reduce the ability to hammer on sys_membarrier On some systems, sys_membarrier can be very expensive, causing overall slowdowns for everything. So put a lock on the path in order to serialize
- CVE-2024-26601Feb 24, 2024affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
In the Linux kernel, the following vulnerability has been resolved: ext4: regenerate buddy after block freeing failed if under fc replay This mostly reverts commit 6bd97bf273bd ("ext4: remove redundant mb_regenerate_buddy()") and reintroduces mb_regenerate_buddy(). Based on cod
- CVE-2024-26600Feb 24, 2024affected < 5.14.21-150400.24.116.1fixed 5.14.21-150400.24.116.1
In the Linux kernel, the following vulnerability has been resolved: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP If the external phy working together with phy-omap-usb2 does not implement send_srp(), we may still attempt to call it. This can happen on an idle Et
- CVE-2024-26598Feb 23, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache There is a potential UAF scenario in the case of an LPI translation cache hit racing with an operation that invalidates the cache, such as a DI
- CVE-2024-26595Feb 23, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path When calling mlxsw_sp_acl_tcam_region_destroy() from an error path after failing to attach the region to an ACL group, we hit a NULL pointer
- CVE-2023-52464Feb 23, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: EDAC/thunderx: Fix possible out-of-bounds string access Enabling -Wstringop-overflow globally exposes a warning for a common bug in the usage of strncat(): drivers/edac/thunderx_edac.c: In function 'thunderx
- CVE-2023-52463Feb 23, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: efivarfs: force RO when remounting if SetVariable is not supported If SetVariable at runtime is not supported by the firmware we never assign a callback for that function. At the same time mount the efivarfs as
- CVE-2023-52457Feb 23, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed Returning an error code from .remove() makes the driver core emit the little helpful error message: remove callback return
- CVE-2023-52456Feb 23, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: serial: imx: fix tx statemachine deadlock When using the serial port as RS485 port, the tx statemachine is used to control the RTS pin to drive the RS485 transceiver TX_EN pin. When the TTY port is closed in th
- CVE-2023-52454Feb 23, 2024affected < 5.14.21-150400.24.116.1fixed 5.14.21-150400.24.116.1
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length If the host sends an H2CData command with an invalid DATAL, the kernel may crash in nvmet_tcp_build_pdu_iovec(). Unable to handle kernel
- CVE-2024-26593Feb 23, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Fix block process call transactions According to the Intel datasheets, software must reset the block buffer index twice for block process call transactions: once before writing the outgoing data to t
- affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: bpf: Defer the free of inner map when necessary When updating or deleting an inner map in map array or map htab, the map may still be accessed by non-sleepable program or sleepable program. However bpf_map_fd_p
- CVE-2024-26591Feb 22, 2024affected < 5.14.21-150400.24.111.1fixed 5.14.21-150400.24.111.1
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix re-attachment branch in bpf_tracing_prog_attach The following case can cause a crash due to missing attach_btf: 1) load rawtp program 2) load fentry program with rawtp as target_fd 3) create tracing l
Page 90 of 96