VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS

Vulnerabilities (2,310)

  • CVE-2022-50543Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix mr->map double free rxe_mr_cleanup() which tries to free mr->map again will be called when rxe_mr_init_user() fails: CPU: 0 PID: 4917 Comm: rdma_flush_serv Kdump: loaded Not tainted 6.1.0-rc1-

  • CVE-2022-50542Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: media: si470x: Fix use-after-free in si470x_int_in_callback() syzbot reported use-after-free in si470x_int_in_callback() [1]. This indicates that urb->context, which contains struct si470x_device object, is fr

  • CVE-2022-50541Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow UDMA_CHAN_RT_*BCNT_REG stores the real-time channel bytecount statistics. These registers are 32-bit hardware counters and the driver

  • CVE-2022-50537Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: firmware: raspberrypi: fix possible memory leak in rpi_firmware_probe() In rpi_firmware_probe(), if mbox_request_channel() fails, the 'fw' will not be freed through rpi_firmware_delete(), fix this leak by calli

  • CVE-2022-50535Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix potential null-deref in dm_resume [Why] Fixing smatch error: dm_resume() error: we previously assumed 'aconnector->dc_link' could be null [How] Check if dc_link null at the beginning of th

  • CVE-2023-53651Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: Input: exc3000 - properly stop timer on shutdown We need to stop the timer on driver unbind or probe failures, otherwise we get UAF/Oops.

  • CVE-2023-53650Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() If 'mipid_detect()' fails, we must free 'md' to avoid a memory leak.

  • CVE-2023-53648Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer smatch error: sound/pci/ac97/ac97_codec.c:2354 snd_ac97_mixer() error: we previously assumed 'rac97' could be null (see line 2072) remove redundant a

  • CVE-2023-53644Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: media: radio-shark: Add endpoint checks The syzbot fuzzer was able to provoke a WARNING from the radio-shark2 driver: ------------[ cut here ]------------ usb 1-1: BOGUS urb xfer, pipe 1 != type 3 WARNING: CPU

  • CVE-2023-53641Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: hif_usb: fix memory leak of remain_skbs hif_dev->remain_skb is allocated and used exclusively in ath9k_hif_usb_rx_stream(). It is implied that an allocated remain_skb is processed and subsequently

  • CVE-2023-53640Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: lpass: Fix for KASAN use_after_free out of bounds When we run syzkaller we get below Out of Bounds error. "KASAN: slab-out-of-bounds Read in regcache_flat_read" Below is the backtrace of the issue: BUG

  • CVE-2023-53639Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath6kl: reduce WARN to dev_dbg() in callback The warn is triggered on a known race condition, documented in the code above the test, that is correctly handled. Using WARN() hinders automated testing. Red

  • CVE-2023-53637Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: media: i2c: ov772x: Fix memleak in ov772x_probe() A memory leak was reported when testing ov772x with bpf mock device: AssertionError: unreferenced object 0xffff888109afa7a8 (size 8): comm "python3", pid 279

  • CVE-2023-53631Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-sysman: Fix reference leak If a duplicate attribute is found using kset_find_obj(), a reference to that attribute is returned. This means that we need to dispose it accordingly. Use kobject_p

  • CVE-2023-53626Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix possible double unlock when moving a directory

  • CVE-2023-53625Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: drm/i915/gvt: fix vgpu debugfs clean in remove Check carefully on root debugfs available when destroying vgpu, e.g in remove case drm minor's debugfs root might already be destroyed, which led to kernel oops li

  • CVE-2023-53622Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix possible data races in gfs2_show_options() Some fields such as gt_logd_secs of the struct gfs2_tune are accessed without holding the lock gt_spin in gfs2_show_options(): val = sdp->sd_tune.gt_logd_

  • CVE-2023-53619Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free If nf_conntrack_init_start() fails (for example due to a register_nf_conntrack_bpf() failure), the nf_conntrack_helper_fini() clean-up path frees th

  • CVE-2023-53617Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: soc: aspeed: socinfo: Add kfree for kstrdup Add kfree() in the later error handling in order to avoid memory leak.

  • CVE-2022-50534Oct 7, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: dm thin: Use last transaction's pmd->root when commit failed Recently we found a softlock up problem in dm thin pool btree lookup code due to corrupted metadata: Kernel panic - not syncing: softlockup: hung t

Page 26 of 116