VYPR

rpm package

suse/kernel-source-rt&distro=SUSE Linux Enterprise Micro 5.1

pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Vulnerabilities (1,237)

  • CVE-2022-48732Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: fix off by one in BIOS boundary checking Bounds checking when parsing init scripts embedded in the BIOS reject access to the last byte. This causes driver initialization to fail on Apple eMac's wit

  • CVE-2022-48730Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: dma-buf: heaps: Fix potential spectre v1 gadget It appears like nr could be a Spectre v1 gadget as it's supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to

  • CVE-2022-48728Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix AIP early init panic An early failure in hfi1_ipoib_setup_rn() can lead to the following panic: BUG: unable to handle kernel NULL pointer dereference at 00000000000001b0 PGD 0 P4D 0 Oops: 00

  • CVE-2022-48726Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/ucma: Protect mc during concurrent multicast leaves Partially revert the commit mentioned in the Fixes line to make sure that allocation and erasing multicast struct are locked. BUG: KASAN: use-after-fr

  • CVE-2022-48724Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() After commit e3beca48a45b ("irqdomain/treewide: Keep firmware node unconditionally allocated"). For tear down scenario, fn is only freed afte

  • CVE-2022-48722Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: ca8210: Stop leaking skb's Upon error the ieee802154_xmit_complete() helper is not called. Only ieee802154_wake_queue() is called manually. We then leak the skb structure. Free the skb structu

  • CVE-2022-48717Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: max9759: fix underflow in speaker_gain_control_put() Check for negative values of "priv->gain" to prevent an out of bounds access. The concern is that these might come from the user via: -> snd_ctl_ele

  • CVE-2022-48715Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe Running tests with a debug kernel shows that bnx2fc_recv_frame() is modifying the per_cpu lport stats counters in a non-mpsafe way. Just boot a debug kernel and r

  • CVE-2022-48711Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: tipc: improve size validations for received domain records The function tipc_mon_rcv() allows a node to receive and process domain_record structs from peer nodes to track their views of the network topology. T

  • CVE-2021-47620Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: refactor malicious adv data check Check for out-of-bound read was being performed at the end of while num_reports loop, and would fill journal with false positives. Added check to beginning of loop p

  • CVE-2021-47619Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: i40e: Fix queues reservation for XDP When XDP was configured on a system with large number of CPUs and X722 NIC there was a call trace with NULL pointer dereference. i40e 0000:87:00.0: failed to get tracking f

  • CVE-2021-47618Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: ARM: 9170/1: fix panic when kasan and kprobe are enabled arm32 uses software to simulate the instruction replaced by kprobe. some instructions may be simulated by constructing assembly functions. therefore, bef

  • CVE-2021-47617Jun 20, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: PCI: pciehp: Fix infinite loop in IRQ handler upon power fault The Power Fault Detected bit in the Slot Status register differs from all other hotplug events in that it is sticky: It can only be cleared after

  • CVE-2021-47612Jun 19, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: nfc: fix segfault in nfc_genl_dump_devices_done When kmalloc in nfc_genl_dump_devices() fails then nfc_genl_dump_devices_done() segfaults as below KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000

  • CVE-2021-47611Jun 19, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: mac80211: validate extended element ID is present Before attempting to parse an extended element, verify that the extended element ID is present.

  • CVE-2021-47609Jun 19, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tr

  • CVE-2021-47602Jun 19, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: mac80211: track only QoS data frames for admission control For admission control, obviously all of that only works for QoS data frames, otherwise we cannot even access the QoS field in the header. Syzbot repor

  • CVE-2021-47600Jun 19, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: dm btree remove: fix use after free in rebalance_children() Move dm_tm_unlock() after dm_tm_dec().

  • CVE-2021-47598Jun 19, 2024
    affected < 5.3.18-150300.178.1fixed 5.3.18-150300.178.1

    In the Linux kernel, the following vulnerability has been resolved: sch_cake: do not call cake_destroy() from cake_init() qdiscs are not supposed to call their own destroy() method from init(), because core stack already does that. syzbot was able to trigger use after free: D

  • CVE-2021-47596Jun 19, 2024
    affected < 5.3.18-150300.175.1fixed 5.3.18-150300.175.1

    In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg Currently, the hns3_remove function firstly uninstall client instance, and then uninstall acceletion engine device. The netdevice is freed in client ins

Page 36 of 62