rpm package
suse/kernel-syms-azure&distro=SUSE Linux Enterprise Server 12 SP5
pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5
Vulnerabilities (1,481)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-52488 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 29, 2024 | In the Linux kernel, the following vulnerability has been resolved: serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO The SC16IS7XX IC supports a burst mode to access the FIFOs where the initial register address is sent ($00), followed by all the FIFO d | ||
| CVE-2023-52486 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 29, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm: Don't unref the same fb many times by mistake due to deadlock handling If we get a deadlock after the fb lookup in drm_mode_page_flip_ioctl() we proceed to unref the fb and then retry the whole thing from | ||
| CVE-2023-52482 | — | < 4.12.14-16.173.1 | 4.12.14-16.173.1 | Feb 29, 2024 | In the Linux kernel, the following vulnerability has been resolved: x86/srso: Add SRSO mitigation for Hygon processors Add mitigation for the speculative return stack overflow vulnerability which exists on Hygon processors too. | ||
| CVE-2023-52478 | — | < 4.12.14-16.173.1 | 4.12.14-16.173.1 | Feb 29, 2024 | In the Linux kernel, the following vulnerability has been resolved: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect hidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU) races when it races with itself. hidpp_connect_event() primarily runs fro | ||
| CVE-2023-52477 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 29, 2024 | In the Linux kernel, the following vulnerability has been resolved: usb: hub: Guard against accesses to uninitialized BOS descriptors Many functions in drivers/usb/core/hub.c and drivers/usb/core/hub.h access fields inside udev->bos without checking if it was allocated and init | ||
| CVE-2023-52476 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 29, 2024 | In the Linux kernel, the following vulnerability has been resolved: perf/x86/lbr: Filter vsyscall addresses We found that a panic can occur when a vsyscall is made while LBR sampling is active. If the vsyscall is interrupted (NMI) for perf sampling, this call sequence can occur | ||
| CVE-2023-52475 | — | < 4.12.14-16.173.1 | 4.12.14-16.173.1 | Feb 29, 2024 | In the Linux kernel, the following vulnerability has been resolved: Input: powermate - fix use-after-free in powermate_config_complete syzbot has found a use-after-free bug [1] in the powermate driver. This happens when the device is disconnected, which leads to a memory free f | ||
| CVE-2023-51779 | Hig | 7.0 | < 4.12.14-16.163.1 | 4.12.14-16.163.1 | Feb 29, 2024 | bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition. | |
| CVE-2021-47049 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Use after free in __vmbus_open() The "open_info" variable is added to the &vmbus_connection.chn_msg_list, but the error handling frees "open_info" without removing it from the list. This wi | ||
| CVE-2021-47045 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() It is possible to call lpfc_issue_els_plogi() passing a did for which no matching ndlp is found. A call is then made to lpfc_prep_els_iocb() with | ||
| CVE-2021-47034 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: Fix pte update for kernel memory on radix When adding a PTE a ptesync is needed to order the update of the PTE with subsequent accesses otherwise a spurious fault may be raised. radix__set_pte_at( | ||
| CVE-2021-47024 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: free queued packets when closing socket As reported by syzbot [1], there is a memory leak while closing the socket. We partially solved this issue with commit ac03046ece2b ("vsock/virtio: free pac | ||
| CVE-2021-47015 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix RX consumer index logic in the error path. In bnxt_rx_pkt(), the RX buffers are expected to complete in order. If the RX consumer index indicates an out of order buffer completion, it means we are | ||
| CVE-2021-47013 | — | < 4.12.14-16.173.1 | 4.12.14-16.173.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send In emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(..,skb,..). If some error happens in emac_tx_fill_tpd(), the skb will be freed via dev_kfree_sk | ||
| CVE-2021-47006 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook The commit 1879445dfa7b ("perf/core: Set event's default ::overflow_handler()") set a default event->overflow_handler in perf_ | ||
| CVE-2021-46998 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: ethernet:enic: Fix a use after free bug in enic_hard_start_xmit In enic_hard_start_xmit, it calls enic_queue_wq_skb(). Inside enic_queue_wq_skb, if some error happens, the skb will be freed by dev_kfree_skb(skb | ||
| CVE-2021-46992 | — | < 4.12.14-16.173.1 | 4.12.14-16.173.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: avoid overflows in nft_hash_buckets() Number of buckets being stored in 32bit variables, we have to ensure that no overflows occur in nft_hash_buckets() syzbot injected a size == 0x4000000 | ||
| CVE-2021-46991 | — | < 4.12.14-16.173.1 | 4.12.14-16.173.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: i40e: Fix use-after-free in i40e_client_subtask() Currently the call to i40e_client_del_instance frees the object pf->cinst, however pf->cinst->lan_info is being accessed after the free. Fix this by adding the | ||
| CVE-2021-46990 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: Fix crashes when toggling entry flush barrier The entry flush mitigation can be enabled/disabled at runtime via a debugfs file (entry_flush), which causes the kernel to patch itself to enable/disab | ||
| CVE-2021-46988 | — | < 4.12.14-16.182.1 | 4.12.14-16.182.1 | Feb 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: userfaultfd: release page in error path to avoid BUG_ON Consider the following sequence of events: 1. Userspace issues a UFFD ioctl, which ends up calling into shmem_mfill_atomic_pte(). We successfully acco |
- CVE-2023-52488Feb 29, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO The SC16IS7XX IC supports a burst mode to access the FIFOs where the initial register address is sent ($00), followed by all the FIFO d
- CVE-2023-52486Feb 29, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: drm: Don't unref the same fb many times by mistake due to deadlock handling If we get a deadlock after the fb lookup in drm_mode_page_flip_ioctl() we proceed to unref the fb and then retry the whole thing from
- CVE-2023-52482Feb 29, 2024affected < 4.12.14-16.173.1fixed 4.12.14-16.173.1
In the Linux kernel, the following vulnerability has been resolved: x86/srso: Add SRSO mitigation for Hygon processors Add mitigation for the speculative return stack overflow vulnerability which exists on Hygon processors too.
- CVE-2023-52478Feb 29, 2024affected < 4.12.14-16.173.1fixed 4.12.14-16.173.1
In the Linux kernel, the following vulnerability has been resolved: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect hidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU) races when it races with itself. hidpp_connect_event() primarily runs fro
- CVE-2023-52477Feb 29, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: usb: hub: Guard against accesses to uninitialized BOS descriptors Many functions in drivers/usb/core/hub.c and drivers/usb/core/hub.h access fields inside udev->bos without checking if it was allocated and init
- CVE-2023-52476Feb 29, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: perf/x86/lbr: Filter vsyscall addresses We found that a panic can occur when a vsyscall is made while LBR sampling is active. If the vsyscall is interrupted (NMI) for perf sampling, this call sequence can occur
- CVE-2023-52475Feb 29, 2024affected < 4.12.14-16.173.1fixed 4.12.14-16.173.1
In the Linux kernel, the following vulnerability has been resolved: Input: powermate - fix use-after-free in powermate_config_complete syzbot has found a use-after-free bug [1] in the powermate driver. This happens when the device is disconnected, which leads to a memory free f
- affected < 4.12.14-16.163.1fixed 4.12.14-16.163.1
bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.
- CVE-2021-47049Feb 28, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Use after free in __vmbus_open() The "open_info" variable is added to the &vmbus_connection.chn_msg_list, but the error handling frees "open_info" without removing it from the list. This wi
- CVE-2021-47045Feb 28, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() It is possible to call lpfc_issue_els_plogi() passing a did for which no matching ndlp is found. A call is then made to lpfc_prep_els_iocb() with
- CVE-2021-47034Feb 28, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: Fix pte update for kernel memory on radix When adding a PTE a ptesync is needed to order the update of the PTE with subsequent accesses otherwise a spurious fault may be raised. radix__set_pte_at(
- CVE-2021-47024Feb 28, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: free queued packets when closing socket As reported by syzbot [1], there is a memory leak while closing the socket. We partially solved this issue with commit ac03046ece2b ("vsock/virtio: free pac
- CVE-2021-47015Feb 28, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix RX consumer index logic in the error path. In bnxt_rx_pkt(), the RX buffers are expected to complete in order. If the RX consumer index indicates an out of order buffer completion, it means we are
- CVE-2021-47013Feb 28, 2024affected < 4.12.14-16.173.1fixed 4.12.14-16.173.1
In the Linux kernel, the following vulnerability has been resolved: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send In emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(..,skb,..). If some error happens in emac_tx_fill_tpd(), the skb will be freed via dev_kfree_sk
- CVE-2021-47006Feb 28, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook The commit 1879445dfa7b ("perf/core: Set event's default ::overflow_handler()") set a default event->overflow_handler in perf_
- CVE-2021-46998Feb 28, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: ethernet:enic: Fix a use after free bug in enic_hard_start_xmit In enic_hard_start_xmit, it calls enic_queue_wq_skb(). Inside enic_queue_wq_skb, if some error happens, the skb will be freed by dev_kfree_skb(skb
- CVE-2021-46992Feb 28, 2024affected < 4.12.14-16.173.1fixed 4.12.14-16.173.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: avoid overflows in nft_hash_buckets() Number of buckets being stored in 32bit variables, we have to ensure that no overflows occur in nft_hash_buckets() syzbot injected a size == 0x4000000
- CVE-2021-46991Feb 28, 2024affected < 4.12.14-16.173.1fixed 4.12.14-16.173.1
In the Linux kernel, the following vulnerability has been resolved: i40e: Fix use-after-free in i40e_client_subtask() Currently the call to i40e_client_del_instance frees the object pf->cinst, however pf->cinst->lan_info is being accessed after the free. Fix this by adding the
- CVE-2021-46990Feb 28, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: Fix crashes when toggling entry flush barrier The entry flush mitigation can be enabled/disabled at runtime via a debugfs file (entry_flush), which causes the kernel to patch itself to enable/disab
- CVE-2021-46988Feb 28, 2024affected < 4.12.14-16.182.1fixed 4.12.14-16.182.1
In the Linux kernel, the following vulnerability has been resolved: userfaultfd: release page in error path to avoid BUG_ON Consider the following sequence of events: 1. Userspace issues a UFFD ioctl, which ends up calling into shmem_mfill_atomic_pte(). We successfully acco
Page 41 of 75