VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS

Vulnerabilities (2,310)

  • CVE-2022-50623Dec 8, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() The "hdr.count * sizeof(s32)" multiplication can overflow on 32 bit systems leading to memory corruption. Use array_size() to fix that.

  • CVE-2022-50622Dec 8, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential memory leak in ext4_fc_record_modified_inode() As krealloc may return NULL, in this case 'state->fc_modified_inodes' may not be freed by krealloc, but 'state->fc_modified_inodes' already set

  • CVE-2022-50621Dec 8, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: dm: verity-loadpin: Only trust verity targets with enforcement Verity targets can be configured to ignore corrupted data blocks. LoadPin must only trust verity targets that are configured to perform some kind o

  • CVE-2022-50619Dec 8, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr() If the number of pages from the userptr BO differs from the SG BO then the allocated memory for the SG table doesn't get freed before returning -EINVAL, w

  • CVE-2022-50618Dec 8, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: mmc: meson-gx: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, it will lead two issues: 1. The memory that allocated in mmc_alloc_host() is leaked. 2. In

  • CVE-2022-50617Dec 8, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/powerplay/psm: Fix memory leak in power state init Commit 902bc65de0b3 ("drm/amdgpu/powerplay/psm: return an error in power state init") made the power state init function return early in case of fai

  • CVE-2022-50615Dec 8, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() pci_get_device() will increase the reference count for the returned pci_dev, so snr_uncore_get_mc_dev() will return a pci_dev with its re

  • CVE-2022-50614Dec 8, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic The dma_map_single() doesn't permit zero length mapping. It causes a follow panic. A panic was reported on arm64: [ 60.137988] ------

  • CVE-2025-40280Dec 6, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_mon_reinit_self(). syzbot reported use-after-free of tipc_net(net)->monitors[] in tipc_mon_reinit_self(). [0] The array is protected by RTNL, but tipc_mon_reinit_self() iterate

  • CVE-2025-40277Dec 6, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds acc

  • CVE-2025-40258Dec 4, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race condition in mptcp_schedule_work() syzbot reported use-after-free in mptcp_schedule_work() [1] Issue here is that mptcp_schedule_work() schedules a work, then gets a refcount on sk->sk_refcnt i

  • CVE-2025-40257Dec 4, 2025
    affected < 5.14.21-150500.55.136.1fixed 5.14.21-150500.55.136.1

    In the Linux kernel, the following vulnerability has been resolved: mptcp: fix a race in mptcp_pm_del_add_timer() mptcp_pm_del_add_timer() can call sk_stop_timer_sync(sk, &entry->add_timer) while another might have free entry already, as reported by syzbot. Add RCU protection

  • CVE-2025-40256Dec 4, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added In commit b441cf3f8c4b ("xfrm: delete x->tunnel as we delete x"), I missed the case where state creation fails between f

  • CVE-2025-40242Dec 4, 2025
    affected < 5.14.21-150500.55.141.1fixed 5.14.21-150500.55.141.1

    In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix unlikely race in gdlm_put_lock In gdlm_put_lock(), there is a small window of time in which the DFL_UNMOUNT flag has been set but the lockspace hasn't been released, yet. In that window, dlm may stil

  • CVE-2025-40233Dec 4, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: ocfs2: clear extent cache after moving/defragmenting extents The extent map cache can become stale when extents are moved or defragmented, causing subsequent operations to see outdated extent flags. This trigg

  • CVE-2025-40220Dec 4, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: fuse: fix livelock in synchronous file put from fuseblk workers I observed a hang when running generic/323 against a fuseblk server. This test opens a file, initiates a lot of AIO writes to that file descriptor

  • CVE-2025-40215Dec 4, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: xfrm: delete x->tunnel as we delete x The ipcomp fallback tunnels currently get deleted (from the various lists and hashtables) as the last user state that needed that fallback is destroyed (not deleted). If a

  • CVE-2025-40204Nov 12, 2025
    affected < 5.14.21-150500.55.130.3fixed 5.14.21-150500.55.130.3

    In the Linux kernel, the following vulnerability has been resolved: sctp: Fix MAC comparison to be constant-time To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.

  • CVE-2025-40154Nov 12, 2025
    affected < 5.14.21-150500.55.130.3fixed 5.14.21-150500.55.130.3

    In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxect

  • CVE-2025-40139Nov 12, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set(). smc_clc_prfx_set() is called during connect() and not under RCU nor RTNL. Using sk_dst_get(sk)->dev could trigger UAF. Let's use __sk_dst_ge

Page 21 of 116