VYPR

rpm package

suse/kernel-syms-azure&distro=SUSE Linux Enterprise Module for Public Cloud 15 SP6

pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP6

Vulnerabilities (3,769)

  • CVE-2024-38632Jun 21, 2024
    affected < 6.4.0-150600.8.14.1fixed 6.4.0-150600.8.14.1

    In the Linux kernel, the following vulnerability has been resolved: vfio/pci: fix potential memory leak in vfio_intx_enable() If vfio_irq_ctx_alloc() failed will lead to 'name' memory leak.

  • CVE-2024-38630Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer handler is running, del_timer()

  • CVE-2024-38629Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Avoid unnecessary destruction of file_ida file_ida is allocated during cdev open and is freed accordingly during cdev release. This sequence is guaranteed by driver file operations. Therefore,

  • CVE-2024-38628Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind. Hang on to the control IDs instead of pointers since those are correctly handled with locks.

  • CVE-2024-38627Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: stm class: Fix a double free in stm_register_device() The put_device(&stm->dev) call will trigger stm_device_release() which frees "stm" so the vfree(stm) on the next line is a double free.

  • CVE-2024-38622Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add callback function pointer check before its call In dpu_core_irq_callback_handler() callback function pointer is compared to NULL, but then callback function is unconditionally called by this po

  • CVE-2024-38621Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: media: stk1160: fix bounds checking in stk1160_copy_video() The subtract in this condition is reversed. The ->length is the length of the buffer. The ->bytesused is how many bytes we have copied thus far. Wh

  • CVE-2024-38390Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails Calling a6xx_destroy() before adreno_gpu_init() leads to a null pointer dereference on: msm_gpu_cleanup() : platform_set_drvdata(gpu->pdev,

  • CVE-2024-38388Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup Use the control private_free callback to free the associated data block. This ensures that the memory won't leak, whatever way the control gets destroy

  • CVE-2024-36478Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' Writing 'power' and 'submit_queues' concurrently will trigger kernel panic: Test script: modprobe null_blk nr_devices=0 mkdir -

  • CVE-2024-36281Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules rx_create no longer allocates a modify_hdr instance that needs to be cleaned up. The mlx5_modify_header_dealloc call will lead to a NU

  • CVE-2024-36244Jun 21, 2024
    affected < 6.4.0-150600.8.17.1fixed 6.4.0-150600.8.17.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: extend minimum interval restriction to entire cycle too It is possible for syzbot to side-step the restriction imposed by the blamed commit in the Fixes: tag, because the taprio UAPI permits

  • CVE-2024-33619Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: efi: libstub: only free priv.runtime_map when allocated priv.runtime_map is only allocated when efi_novamap is not set. Otherwise, it is an uninitialized value. In the error path, it is freed unconditionally.

  • CVE-2024-31076Jun 21, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline The absence of IRQD_MOVE_PCNTXT prevents immediate effectiveness of interrupt affinity reconfiguration via procfs. Instead, the change is de

  • CVE-2023-52884Jun 21, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: Input: cyapa - add missing input core locking to suspend/resume functions Grab input->mutex during suspend/resume functions like it is done in other input drivers. This fixes the following warning during system

  • CVE-2023-52883Jun 20, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix possible null pointer dereference abo->tbo.resource may be NULL in amdgpu_vm_bo_update.

  • CVE-2024-38619MedJun 20, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: usb-storage: alauda: Check whether the media is initialized The member "uzonesize" of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and a

  • CVE-2024-38615MedJun 19, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: cpufreq: exit() callback is optional The exit() callback is optional and shouldn't be called without checking a valid pointer first. Also, we must clear freq_table pointer even if the exit() callback isn't pre

  • CVE-2024-38599HigJun 19, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: jffs2: prevent xattr node from overflowing the eraseblock Add a check to make sure that the requested xattr node size is no larger than the eraseblock minus the cleanmarker. Unlike the usual inode nodes, the x

  • CVE-2024-38598MedJun 19, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: md: fix resync softlockup when bitmap size is less than array size Is is reported that for dm-raid10, lvextend + lvchange --syncaction will trigger following softlockup: kernel:watchdog: BUG: soft lockup - CPU

Page 148 of 189