VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS

Vulnerabilities (2,310)

  • CVE-2023-53806Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: populate subvp cmd info only for the top pipe [Why] System restart observed while changing the display resolution to 8k with extended mode. Sytem restart was caused by a page fault. [How] When

  • CVE-2023-53804Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() During unmount process of nilfs2, nothing holds nilfs_root structure after nilfs2 detaches its writer in nilfs_detach_log_writer(). However,

  • CVE-2023-53803Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() A fix for: BUG: KASAN: slab-out-of-bounds in ses_enclosure_data_process+0x949/0xe30 [ses] Read of size 1 at addr ffff88a1b043a451 by task syste

  • CVE-2023-53802Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function It is stated that ath9k_htc_rx_msg() either frees the provided skb or passes its management to another callback function. Ho

  • CVE-2023-53801Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: iommu/sprd: Release dma buffer to avoid memory leak When attaching to a domain, the driver would alloc a DMA buffer which is used to store address mapping table, and it need to be released when the IOMMU domain

  • CVE-2023-53794Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: cifs: fix session state check in reconnect to avoid use-after-free issue Don't collect exiting session in smb2_reconnect_server(), because it will be released soon. Note that the exiting session will stay in s

  • CVE-2023-53792Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: nvme-core: fix memory leak in dhchap_ctrl_secret Free dhchap_secret in nvme_ctrl_dhchap_ctrl_secret_store() before we return when nvme_auth_generate_key() returns error.

  • CVE-2023-53788Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() tuning_ctl_set() might have buffer overrun at (X) if it didn't break from loop by matching (A). static int tuning_ctl_set(...) { for (i = 0; i < T

  • CVE-2023-53786Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: dm flakey: fix a crash with invalid table line This command will crash with NULL pointer dereference: dmsetup create flakey --table \ "0 `blockdev --getsize /dev/ram0` flakey /dev/ram0 0 0 1 2 corrupt_bio_by

  • CVE-2023-53783Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: blk-iocost: fix divide by 0 error in calc_lcoefs() echo max of u64 to cost.model can cause divide by 0 error. # echo 8:0 rbps=18446744073709551615 > /sys/fs/cgroup/io.cost.model divide error: 0000 [#1] PR

  • CVE-2023-53781Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: smc: Fix use-after-free in tcp_write_timer_handler(). With Eric's ref tracker, syzbot finally found a repro for use-after-free in tcp_write_timer_handler() by kernel TCP sockets. [0] If SMC creates a kernel so

  • CVE-2023-53780Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix FCLK pstate change underflow [Why] Currently we set FCLK p-state change watermark calculated based on dummy p-state latency when UCLK p-state is not supported [How] Calculate FCLK p-state

  • CVE-2022-50656Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: nfc: pn533: Clear nfc_target before being used Fix a slab-out-of-bounds read that occurs in nla_put() called from nfc_genl_send_target() when target->sensb_res_len, which is duplicated from an nfc_target in pn5

  • CVE-2022-50653Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: mmc: atmel-mci: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, it will lead two issues: 1. The memory that allocated in mmc_alloc_host() is leaked. 2. I

  • CVE-2022-50652Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: uio: uio_dmem_genirq: Fix missing unlock in irq configuration Commit b74351287d4b ("uio: fix a sleep-in-atomic-context bug in uio_dmem_genirq_irqcontrol()") started calling disable_irq() without holding the spi

  • CVE-2022-50649Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() ADP5061_CHG_STATUS_1_CHG_STATUS is masked with 0x07, which means a length of 8, but adp5061_chg_type array size is 4, may end up reading

  • CVE-2022-50646Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: hpsa: Fix possible memory leak in hpsa_init_one() The hpda_alloc_ctlr_info() allocates h and its field reply_map. However, in hpsa_init_one(), if alloc_percpu() failed, the hpsa_init_one() jumps to clean1

  • CVE-2022-50644Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe pm_runtime_get_sync() will increment pm usage counter. Forgetting to putting operation will result in reference leak. Add missing pm_runtime_put_sy

  • CVE-2022-50643Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: cifs: Fix xid leak in cifs_copy_file_range() If the file is used by swap, before return -EOPNOTSUPP, should free the xid, otherwise, the xid will be leaked.

  • CVE-2022-50641Dec 9, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: HSI: omap_ssi: Fix refcount leak in ssi_probe When returning or breaking early from a for_each_available_child_of_node() loop, we need to explicitly call of_node_put() on the child node to possibly release the

Page 19 of 116