VYPR

rpm package

suse/kernel-syms-azure&distro=SUSE Linux Enterprise Module for Public Cloud 15 SP6

pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP6

Vulnerabilities (3,769)

  • CVE-2024-41089Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes In nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a possible NULL pointer der

  • CVE-2024-41088Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: can: mcp251xfd: fix infinite loop when xmit fails When the mcp251xfd_start_xmit() function fails, the driver stops processing messages, and the interrupt routine does not return, running indefinitely even after

  • CVE-2024-41087Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: ata: libata-core: Fix double free on error If e.g. the ata_port_alloc() call in ata_host_alloc() fails, we will jump to the err_out label, which will call devres_release_group(). devres_release_group() will tri

  • CVE-2024-41084Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: cxl/region: Avoid null pointer dereference in region lookup cxl_dpa_to_region() looks up a region based on a memdev and DPA. It wrongly assumes an endpoint found mapping the DPA is also of a fully assembled reg

  • CVE-2024-41082Jul 29, 2024
    affected < 6.4.0-150600.8.17.1fixed 6.4.0-150600.8.17.1

    In the Linux kernel, the following vulnerability has been resolved: nvme-fabrics: use reserved tag for reg read/write command In some scenarios, if too many commands are issued by nvme command in the same time by user tasks, this may exhaust all tags of admin_q. If a reset (nvm

  • CVE-2024-41081Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: ila: block BH in ila_output() As explained in commit 1378817486d6 ("tipc: block BH before using dst_cache"), net/core/dst_cache.c helpers need to be called with BH disabled. ila_output() is called from lwtunne

  • CVE-2024-41080Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: io_uring: fix possible deadlock in io_register_iowq_max_workers() The io_register_iowq_max_workers() function calls io_put_sq_data(), which acquires the sqd->lock without releasing the uring_lock. Similar to th

  • CVE-2024-41079Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: nvmet: always initialize cqe.result The spec doesn't mandate that the first two double words (aka results) for the command queue entry need to be set to 0 when they are not used (not specified). Though, the tar

  • CVE-2024-41078Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: qgroup: fix quota root leak after quota disable failure If during the quota disable we fail when cleaning the quota tree or when deleting the root from the root tree, we jump to the 'out' label without e

  • CVE-2024-41077Jul 29, 2024
    affected < 6.4.0-150600.8.34.1fixed 6.4.0-150600.8.34.1

    In the Linux kernel, the following vulnerability has been resolved: null_blk: fix validation of block size Block size should be between 512 and PAGE_SIZE and be a power of 2. The current check does not validate this, so update the check. Without this patch, null_blk would Oops

  • CVE-2024-41076Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: NFSv4: Fix memory leak in nfs4_set_security_label We leak nfs_fattr and nfs4_label every time we set a security xattr.

  • CVE-2024-41075Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: cachefiles: add consistency check for copen/cread This prevents malicious processes from completing random copen/cread requests and crashing the system. Added checks are listed below: * Generic, copen can on

  • CVE-2024-41074Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: cachefiles: Set object to close if ondemand_id < 0 in copen If copen is maliciously called in the user mode, it may delete the request corresponding to the random id. And the request may have not been read yet.

  • CVE-2024-41073Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: nvme: avoid double free special payload If a discard request needs to be retried, and that retry may fail before a new special payload is added, a double free will result. Clear the RQF_SPECIAL_LOAD when the re

  • CVE-2024-41072Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check In 'cfg80211_wext_siwscan()', add extra check whether number of channels passed via 'ioctl(sock, SIOCSIWSCAN, ...)' doesn't exceed IW_MAX_FREQUENCIES and r

  • CVE-2024-41070Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() Al reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group(). It looks up `stt` from tablefd, but then continues to u

  • CVE-2024-41069Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: topology: Fix references to freed memory Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup()

  • CVE-2024-41068Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Fix sclp_init() cleanup on failure If sclp_init() fails it only partially cleans up: if there are multiple failing calls to sclp_init() sclp_state_change_event will be added several times to sclp_reg

  • CVE-2024-41066Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Add tx check to prevent skb leak Below is a summary of how the driver stores a reference to an skb during transmit: tx_buff[free_map[consumer_index]]->skb = new_skb; free_map[consumer_index] =

  • CVE-2024-41065Jul 29, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Whitelist dtl slub object for copying to userspace Reading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-* results in a BUG() when the config CONFIG_HARDENED_USERCOPY is enabled

Page 137 of 189