VYPR

rpm package

suse/kernel-syms-azure&distro=SUSE Linux Enterprise Module for Public Cloud 15 SP6

pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP6

Vulnerabilities (3,769)

  • CVE-2023-52699May 19, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: sysv: don't call sb_bread() with pointers_lock held syzbot is reporting sleep in atomic context in SysV filesystem [1], for sb_bread() is called with rw_spinlock held. A "write_lock(&pointers_lock) => read_loc

  • CVE-2024-35915MedMay 19, 2024
    affected < 6.4.0-150600.8.5.1fixed 6.4.0-150600.8.5.1

    In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet syzbot reported the following uninit-value access issue [1][2]: nci_rx_work() parses and processes received packet. When the payload length is zero,

  • CVE-2024-35910MedMay 19, 2024
    affected < 6.4.0-150600.8.34.1fixed 6.4.0-150600.8.34.1

    In the Linux kernel, the following vulnerability has been resolved: tcp: properly terminate timers for kernel sockets We had various syzbot reports about tcp timers firing after the corresponding netns has been dismantled. Fortunately Josef Bacik could trigger the issue more o

  • CVE-2024-35905HigMay 19, 2024
    affected < 6.4.0-150600.8.5.1fixed 6.4.0-150600.8.5.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: Protect against int overflow for stack access size This patch re-introduces protection against the size of access to stack memory being negative; the access size can appear negative as a result of overflow

  • CVE-2024-35902MedMay 19, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: net/rds: fix possible cp null dereference cp might be null, calling cp->cp_conn would produce null dereference [Simon Horman adds:] Analysis: * cp is a parameter of __rds_rdma_map and is not reassigned. * T

  • CVE-2024-35900MedMay 19, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject new basechain after table flag update When dormant flag is toggled, hooks are disabled in the commit phase by iterating over current chains in table (existing and new). The followi

  • CVE-2024-35899MedMay 19, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: flush pending destroy work before exit_net release Similar to 2c9f0293280e ("netfilter: nf_tables: flush pending destroy work before netlink notifier") to address a race between exit_net a

  • CVE-2024-35898MedMay 19, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() nft_unregister_flowtable_type() within nf_flow_inet_module_exit() can concurrent with __nft_flowtable_type_get() within nf_tables_newf

  • CVE-2024-35897MedMay 19, 2024
    affected < 6.4.0-150600.8.11.1fixed 6.4.0-150600.8.11.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: discard table flag update with pending basechain deletion Hook unregistration is deferred to the commit phase, same occurs with hook updates triggered by the table dormant flag. When both

  • CVE-2024-35896HigMay 19, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: validate user input for expected length I got multiple syzbot reports showing old bugs exposed by BPF after commit 20f2505fb436 ("bpf: Try to avoid kzalloc in cgroup/{s,g}etsockopt") setsockopt() @o

  • CVE-2024-35895MedMay 19, 2024
    affected < 6.4.0-150600.8.5.1fixed 6.4.0-150600.8.5.1

    In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Prevent lock inversion deadlock in map delete elem syzkaller started using corpuses where a BPF tracing program deletes elements from a sockmap/sockhash map. Because BPF tracing programs can be in

  • CVE-2024-35893MedMay 19, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: act_skbmod: prevent kernel-infoleak syzbot found that tcf_skbmod_dump() was copying four bytes from kernel stack to user space [1]. The issue here is that 'struct tc_skbmod' has a four bytes hole.

  • CVE-2024-35888MedMay 19, 2024
    affected < 6.4.0-150600.8.20.1fixed 6.4.0-150600.8.20.1

    In the Linux kernel, the following vulnerability has been resolved: erspan: make sure erspan_base_hdr is present in skb->head syzbot reported a problem in ip6erspan_rcv() [1] Issue is that ip6erspan_rcv() (and erspan_rcv()) no longer make sure erspan_base_hdr is present in skb

  • CVE-2024-35886HigMay 19, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix infinite recursion in fib6_dump_done(). syzkaller reported infinite recursive calls of fib6_dump_done() during netlink socket destruction. [1] From the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE

  • CVE-2024-35884MedMay 19, 2024
    affected < 6.4.0-150600.8.8.1fixed 6.4.0-150600.8.8.1

    In the Linux kernel, the following vulnerability has been resolved: udp: do not accept non-tunnel GSO skbs landing in a tunnel When rx-udp-gro-forwarding is enabled UDP packets might be GROed when being forwarded. If such packets might land in a tunnel this can cause various is

  • CVE-2024-35877MedMay 19, 2024
    affected < 6.4.0-150600.8.5.1fixed 6.4.0-150600.8.5.1

    In the Linux kernel, the following vulnerability has been resolved: x86/mm/pat: fix VM_PAT handling in COW mappings PAT handling won't do the right thing in COW mappings: the first PTE (or, in fact, all PTEs) can be replaced during write faults to point at anon folios. Reliabl

  • CVE-2024-35866HigMay 19, 2024
    affected < 6.4.0-150600.8.5.1fixed 6.4.0-150600.8.5.1

    In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_dump_full_key() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.

  • CVE-2024-35917May 19, 2024
    affected < 6.4.0-150600.8.5.1fixed 6.4.0-150600.8.5.1

    In the Linux kernel, the following vulnerability has been resolved: s390/bpf: Fix bpf_plt pointer arithmetic Kui-Feng Lee reported a crash on s390x triggered by the dummy_st_ops/dummy_init_ptr_arg test [1]: [<0000000000000002>] 0x2 [<00000000009d5cde>] bpf_struct_ops_test_

  • CVE-2024-35916May 19, 2024
    affected < 6.4.0-150600.8.5.1fixed 6.4.0-150600.8.5.1

    In the Linux kernel, the following vulnerability has been resolved: dma-buf: Fix NULL pointer dereference in sanitycheck() If due to a memory allocation failure mock_chain() returns NULL, it is passed to dma_fence_enable_sw_signaling() resulting in NULL pointer dereference ther

  • CVE-2024-35914May 19, 2024
    affected < 6.4.0-150600.8.5.1fixed 6.4.0-150600.8.5.1

    In the Linux kernel, the following vulnerability has been resolved: nfsd: Fix error cleanup path in nfsd_rename() Commit a8b0026847b8 ("rename(): avoid a deadlock in the case of parents having no common ancestor") added an error bail out path. However this path does not drop th

Page 167 of 189