VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Micro 5.5

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Vulnerabilities (4,617)

  • CVE-2025-39797Sep 12, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: xfrm: Duplicate SPI Handling The issue originates when Strongswan initiates an XFRM_MSG_ALLOCSPI Netlink message, which triggers the kernel function xfrm_alloc_spi(). This function is expected to ensure uniquen

  • CVE-2025-40300MedSep 11, 2025
    affected < 5.14.21-150500.55.136.1fixed 5.14.21-150500.55.136.1

    In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already

  • CVE-2025-39790HigSep 11, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Detect events pointing to unexpected TREs When a remote device sends a completion event to the host, it contains a pointer to the consumed TRE. The host uses this pointer to process all of the T

  • CVE-2025-39742MedSep 11, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() The function divides number of online CPUs by num_core_siblings, and later checks the divider by zero. This implies a possibility to get and divi

  • CVE-2025-39746Sep 11, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: shutdown driver when hardware is unreliable In rare cases, ath10k may lose connection with the PCIe bus due to some unknown reasons, which could further lead to system crashes during resuming due

  • CVE-2025-39703MedSep 5, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: net, hsr: reject HSR frame if skb can't hold tag Receiving HSR frame with insufficient space to hold HSR tag in the skb can result in a crash (kernel BUG): [ 45.390915] skbuff: skb_under_panic: text:ffffffff

  • CVE-2025-39691HigSep 5, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: fs/buffer: fix use-after-free when call bh_read() helper There's issue as follows: BUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110 Read of size 8 at addr ffffc9000168f7f8 by task swapper/3/0

  • CVE-2025-39726Sep 5, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: s390/ism: fix concurrency management in ism_cmd() The s390x ISM device data sheet clearly states that only one request-response sequence is allowable per ISM function at any point in time. Unfortunately as of

  • CVE-2025-38734Sep 5, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: net/smc: fix UAF on smcsk after smc_listen_out() BPF CI testing report a UAF issue: [ 16.446633] BUG: kernel NULL pointer dereference, address: 000000000000003 0 [ 16.447134] #PF: supervisor read acce

  • CVE-2025-38713HigSep 4, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() The hfsplus_readdir() method is capable to crash by calling hfsplus_uni2asc(): [ 667.121659][ T9805] =================================================

  • CVE-2025-38706MedSep 4, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() snd_soc_remove_pcm_runtime() might be called with rtd == NULL which will leads to null pointer dereference. This was reproduced with topology lo

  • CVE-2025-38685HigSep 4, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit This issue triggers when a userspace program does an ioctl FBIOPUT_CON2FBMAP by passing console number and frame buffer number. Ideally this maps console

  • CVE-2025-38684MedSep 4, 2025
    affected < 5.14.21-150500.55.136.1fixed 5.14.21-150500.55.136.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: use old 'nbands' while purging unused classes Shuang reported sch_ets test-case [1] crashing in ets_class_qlen_notify() after recent changes from Lion [2]. The problem is: in ets_qdisc_change()

  • CVE-2025-38683MedSep 4, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: hv_netvsc: Fix panic during namespace deletion with VF The existing code move the VF NIC to new namespace when NETDEV_REGISTER is received on netvsc NIC. During deletion of the namespace, default_device_exit_ba

  • CVE-2025-38678Sep 3, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is fo

  • CVE-2024-58240HigAug 28, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: tls: separate no-async decryption request handling from async If we're not doing async, the handling is much simpler. There's no reference counting, we just need to wait for the completion to wake us up and ret

  • CVE-2025-38664Aug 22, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() Add check for the return value of devm_kmemdup() to prevent potential null pointer dereference.

  • CVE-2025-38659Aug 22, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: gfs2: No more self recovery When a node withdraws and it turns out that it is the only node that has the filesystem mounted, gfs2 currently tries to replay the local journal to bring the filesystem back into a

  • CVE-2025-38644Aug 22, 2025
    affected < 5.14.21-150500.55.121.2fixed 5.14.21-150500.55.121.2

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before associati

  • CVE-2025-38618Aug 22, 2025
    affected < 5.14.21-150500.55.121.2fixed 5.14.21-150500.55.121.2

    In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by ac

Page 49 of 231