VYPR

rpm package

suse/kernel-source-rt&distro=SUSE Linux Enterprise Micro 5.1

pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Vulnerabilities (1,237)

  • CVE-2024-44947Sep 2, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: fuse: Initialize beyond-EOF page contents before setting uptodate fuse_notify_store(), unlike fuse_do_readpage(), does not enable page zeroing (because it can be used to change partial page contents). So fuse_

  • CVE-2024-44946Aug 31, 2024
    affected < 5.3.18-150300.187.1fixed 5.3.18-150300.187.1

    In the Linux kernel, the following vulnerability has been resolved: kcm: Serialise kcm_sendmsg() for the same socket. syzkaller reported UAF in kcm_release(). [0] The scenario is 1. Thread A builds a skb with MSG_MORE and sets kcm->seq_skb. 2. Thread A resumes building s

  • CVE-2024-43883Aug 23, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: usb: vhci-hcd: Do not drop references before new references are gained At a few places the driver carries stale pointers to references that can still be used. Make sure that does not happen. This strictly speak

  • CVE-2022-48934Aug 22, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() ida_simple_get() returns an id between min (0) and max (NFP_MAX_MAC_INDEX) inclusive. So NFP_MAX_MAC_INDEX (0xff) is a valid id. In order for th

  • CVE-2022-48933Aug 22, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix memory leak during stateful obj update stateful objects can be updated from the control plane. The transaction logic allocates a temporary object for this purpose. The ->init function

  • CVE-2022-48930Aug 22, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: RDMA/ib_srp: Fix a deadlock Remove the flush_workqueue(system_long_wq) call since flushing system_long_wq is deadlock-prone and since that call is redundant with a preceding cancel_work_sync()

  • CVE-2022-48928Aug 22, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: iio: adc: men_z188_adc: Fix a resource leak in an error handling path If iio_device_register() fails, a previous ioremap() is left unbalanced. Update the error handling path and add the missing iounmap() call,

  • CVE-2022-48926Aug 22, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: usb: gadget: rndis: add spinlock for rndis response list There's no lock for rndis response list. It could cause list corruption if there're two different list_add at the same time like below. It's better to ad

  • CVE-2022-48925Aug 22, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Do not change route.addr.src_addr outside state checks If the state is not idle then resolve_prepare_src() should immediately fail and no change to global state should happen. However, it unconditiona

  • CVE-2022-48919Aug 22, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: cifs: fix double free race when mount fails in cifs_get_root() When cifs_get_root() fails during cifs_smb3_do_mount() we call deactivate_locked_super() which eventually will call delayed_free() which will free

  • CVE-2022-48912Aug 22, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: netfilter: fix use-after-free in __nf_register_net_hook() We must not dereference @new_hooks after nf_hook_mutex has been released, because other threads might have freed our allocated hooks already. BUG: KASA

  • CVE-2022-48911Aug 22, 2024
    affected < 5.3.18-150300.187.1fixed 5.3.18-150300.187.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet

  • CVE-2022-48905Aug 22, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: ibmvnic: free reset-work-item when flushing Fix a tiny memory leak when flushing the reset work queue.

  • CVE-2022-48901Aug 22, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: btrfs: do not start relocation until in progress drops are done We hit a bug with a recovering relocation on mount for one of our file systems in production. I reproduced this locally by injecting errors into

  • CVE-2021-4441Aug 22, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() In zynq_qspi_exec_mem_op(), kzalloc() is directly used in memset(), which could lead to a NULL pointer dereference on failure of kza

  • CVE-2022-48873Aug 21, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Don't remove map on creater_process and device_release Do not remove the map from the list on error path in fastrpc_init_create_process, instead call fastrpc_map_put, to avoid use-after-free. Do

  • CVE-2022-48872Aug 21, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Fix use-after-free race condition for maps It is possible that in between calling fastrpc_map_get() until map->fl->lock is taken in fastrpc_free_map(), another thread can call fastrpc_map_lookup(

  • CVE-2024-43882HigAug 21, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: exec: Fix ToCToU between perm check and set-uid/gid usage When opening a file for exec via do_filp_open(), permission checking is done against the file's metadata at that moment, and on success, a file pointer

  • CVE-2024-43861Aug 20, 2024
    affected < 5.3.18-150300.181.2fixed 5.3.18-150300.181.2

    In the Linux kernel, the following vulnerability has been resolved: net: usb: qmi_wwan: fix memory leak for not ip packets Free the unused skb when not ip packets arrive.

  • CVE-2024-42265MedAug 17, 2024
    affected < 5.3.18-150300.220.1fixed 5.3.18-150300.220.1

    In the Linux kernel, the following vulnerability has been resolved: protect the fetch of ->fd[fd] in do_dup2() from mispredictions both callers have verified that fd is not greater than ->max_fds; however, misprediction might end up with tofree = fdt->fd[fd]; being spec

Page 32 of 62