CVE-2024-41022 Affecting dlm-kmp-default package, versions <6.4.0-150600.23.22.1
Threat Intelligence
EPSS
0.04% (14th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES156-DLMKMPDEFAULT-8076319
- published 24 Sep 2024
- disclosed 23 Sep 2024
Introduced: 23 Sep 2024
CVE-2024-41022 Open this link in a new tabHow to fix?
Upgrade SLES:15.6
dlm-kmp-default
to version 6.4.0-150600.23.22.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream dlm-kmp-default
package and not the dlm-kmp-default
package as distributed by SLES
.
See How to fix?
for SLES:15.6
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
The "instance" variable needs to be signed for the error handling to work.
References
- https://www.suse.com/security/cve/CVE-2024-41022.html
- https://bugzilla.suse.com/1228429
- https://git.kernel.org/stable/c/298e2ce222e712ffafa47288c5b2fcf33d72fda3
- https://git.kernel.org/stable/c/3dd9734878a9042f0358301d19a2b006a0fc4d06
- https://git.kernel.org/stable/c/4edb0a84e6b32e75dc9bd6dd085b2c2ff19ec287
- https://git.kernel.org/stable/c/544fa213f15d27f0370795845d55eeb3e00080d2
- https://git.kernel.org/stable/c/6769a23697f17f9bf9365ca8ed62fe37e361a05a
- https://git.kernel.org/stable/c/a5224e2123ce21102f346f518db80f004d5053a7
- https://git.kernel.org/stable/c/d347c9a398bf7eab9408d207c0a50fb720f9de7d
- https://git.kernel.org/stable/c/e8dfbf83a82bbfb9680921719fbe65e535af59ea
CVSS Scores
version 3.1