VYPR

rpm package

suse/kernel-syms&distro=SUSE Linux Enterprise Server 12 SP5

pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5

Vulnerabilities (1,486)

  • CVE-2024-42287Aug 17, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Complete command early within lock A crash was observed while performing NPIV and FW reset, BUG: kernel NULL pointer dereference, address: 000000000000001c #PF: supervisor read access in kerne

  • CVE-2024-42286Aug 17, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: validate nvme_local_port correctly The driver load failed with error message, qla2xxx [0000:04:00.0]-ffff:0: register_localport failed: ret=ffffffef and with a kernel crash, BUG: unable to ha

  • CVE-2024-42285Aug 17, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix a use-after-free related to destroying CM IDs iw_conn_req_handler() associates a new struct rdma_id_private (conn_id) with an existing struct iw_cm_id (cm_id) as follows: conn_id->cm_id.

  • CVE-2024-42284Aug 17, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: tipc: Return non-zero value from tipc_udp_addr2str() on error tipc_udp_addr2str() should return non-zero value if the UDP media address is invalid. Otherwise, a buffer overflow access can occur in tipc_media_ad

  • CVE-2024-42280Aug 17, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: mISDN: Fix a use after free in hfcmulti_tx() Don't dereference *sp after calling dev_kfree_skb(*sp).

  • CVE-2024-42271Aug 17, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: net/iucv: fix use after free in iucv_sock_close() iucv_sever_path() is called from process context and from bh context. iucv->path is used as indicator whether somebody else is taking care of severing the path

  • CVE-2024-42259MedAug 14, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Fix Virtual Memory mapping boundaries calculation Calculating the size of the mapped area as the lesser value between the requested size and the actual size does not consider the partial mapping o

  • CVE-2024-42246Aug 7, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket When using a BPF program on kernel_connect(), the call can return -EPERM. This causes xs_tcp_setup_socket() to loop forever, filling

  • CVE-2024-42244Aug 7, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: USB: serial: mos7840: fix crash on resume Since commit c49cfa917025 ("USB: serial: use generic method if no alternative is provided in usb serial layer"), USB serial core calls the generic resume implementation

  • CVE-2024-42240Aug 7, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: x86/bhi: Avoid warning in #DB handler due to BHI mitigation When BHI mitigation is enabled, if SYSENTER is invoked with the TF flag set then entry_SYSENTER_compat() uses CLEAR_BRANCH_HISTORY and calls the clear

  • CVE-2024-42236Aug 7, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() Userspace provided string 's' could trivially have the length zero. Left unchecked this will firstly result in an OOB read in the form `if (str

  • CVE-2024-42232Aug 7, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: libceph: fix race between delayed_work() and ceph_monc_stop() The way the delayed work is handled in ceph_monc_stop() is prone to races with mon_fault() and possibly also finish_hunting(). Both of these can re

  • CVE-2024-42228Jul 30, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc Initialize the size before calling amdgpu_vce_cs_reloc, such as case 0x03000001. V2: To really improve the handling we would actually

  • CVE-2024-42224Jul 30, 2024
    affected < 4.12.14-122.225.1fixed 4.12.14-122.225.1

    In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Correct check for empty list Since commit a3c53be55c95 ("net: dsa: mv88e6xxx: Support multiple MDIO busses") mv88e6xxx_default_mdio_bus() has checked that the return value of list_first_ent

  • CVE-2024-42223Jul 30, 2024
    affected < 4.12.14-122.225.1fixed 4.12.14-122.225.1

    In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: tda10048: Fix integer overflow state->xtal_hz can be up to 16M, so it can overflow a 32 bit integer when multiplied by pll_mfactor. Create a new 64 bit variable to hold the calculations.

  • CVE-2024-42162Jul 30, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: gve: Account for stopped queues when reading NIC stats We now account for the fact that the NIC might send us stats for a subset of queues. Without this change, gve_get_ethtool_stats might make an invalid acces

  • CVE-2024-42158Jul 30, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings Replace memzero_explicit() and kfree() with kfree_sensitive() to fix warnings reported by Coccinelle: WARNING opportunity for kfree_sensitive/kvfree_

  • CVE-2024-42157Jul 30, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe sensitive data on failure Wipe sensitive data from stack also if the copy_to_user() fails.

  • CVE-2024-42155Jul 30, 2024
    affected < 4.12.14-122.228.1fixed 4.12.14-122.228.1

    In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe copies of protected- and secure-keys Although the clear-key of neither protected- nor secure-keys is accessible, this key material should only be visible to the calling process. So wipe all copi

  • CVE-2024-42154Jul 30, 2024
    affected < 4.12.14-122.231.1fixed 4.12.14-122.231.1

    In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don't see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn't have an entry for this attribute at all (neither does it

Page 6 of 75