VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Micro 5.5

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Vulnerabilities (4,617)

  • CVE-2025-38460Jul 25, 2025
    affected < 5.14.21-150500.55.121.2fixed 5.14.21-150500.55.121.2

    In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix potential null-ptr-deref in to_atmarpd(). atmarpd is protected by RTNL since commit f3a0592b37b8 ("[ATM]: clip causes unregister hang"). However, it is not enough because to_atmarpd() is called

  • CVE-2025-38375Jul 25, 2025
    affected < 5.14.21-150500.55.136.1fixed 5.14.21-150500.55.136.1

    In the Linux kernel, the following vulnerability has been resolved: virtio-net: ensure the received length does not exceed allocated size In xdp_linearize_page, when reading the following buffers from the ring, we forget to check the received length with the true allocate size.

  • CVE-2025-38352KEVJul 22, 2025
    affected < 5.14.21-150500.55.121.2fixed 5.14.21-150500.55.121.2

    In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be

  • CVE-2025-38350HigJul 19, 2025
    affected < 5.14.21-150500.55.121.2fixed 5.14.21-150500.55.121.2

    In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain classful qdiscs may invoke their classes' dequeue handler on an enqueue operation. This may unexpectedly empty the child qdisc and thu

  • CVE-2025-38323Jul 10, 2025
    affected < 5.14.21-150500.55.121.2fixed 5.14.21-150500.55.121.2

    In the Linux kernel, the following vulnerability has been resolved: net: atm: add lec_mutex syzbot found its way in net/atm/lec.c, and found an error path in lecd_attach() could leave a dangling pointer in dev_lec[]. Add a mutex to protect dev_lecp[] uses from lecd_attach(), l

  • CVE-2025-38289Jul 10, 2025
    affected < 5.14.21-150500.55.116.1fixed 5.14.21-150500.55.116.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk Smatch detected a potential use-after-free of an ndlp oject in dev_loss_tmo_callbk during driver unload or fatal error handling. Fix by re

  • CVE-2025-38257Jul 9, 2025
    affected < 5.14.21-150500.55.116.1fixed 5.14.21-150500.55.116.1

    In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Prevent overflow in size calculation for memdup_user() Number of apqn target list entries contained in 'nr_apqns' variable is determined by userspace via an ioctl call so the result of the product in

  • CVE-2025-38212HigJul 4, 2025
    affected < 5.14.21-150500.55.116.1fixed 5.14.21-150500.55.116.1

    In the Linux kernel, the following vulnerability has been resolved: ipc: fix to protect IPCS lookups using RCU syzbot reported that it discovered a use-after-free vulnerability, [0] [0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/ idr_for_each() i

  • CVE-2025-38234Jul 4, 2025
    affected < 5.14.21-150500.55.144.1fixed 5.14.21-150500.55.144.1

    In the Linux kernel, the following vulnerability has been resolved: sched/rt: Fix race in push_rt_task Overview ======== When a CPU chooses to call push_rt_task and picks a task to push to another CPU's runqueue then it will call find_lock_lowest_rq method which would take a do

  • CVE-2025-38206Jul 4, 2025
    affected < 5.14.21-150500.55.116.1fixed 5.14.21-150500.55.116.1

    In the Linux kernel, the following vulnerability has been resolved: exfat: fix double free in delayed_free The double free could happen in the following path. exfat_create_upcase_table() exfat_create_upcase_table() : return error exfat_free_upcase_table() : fre

  • CVE-2025-38200Jul 4, 2025
    affected < 5.14.21-150500.55.116.1fixed 5.14.21-150500.55.116.1

    In the Linux kernel, the following vulnerability has been resolved: i40e: fix MMIO write access to an invalid page in i40e_clear_hw When the device sends a specific input, an integer underflow can occur, leading to MMIO write access to an invalid page. Prevent the integer unde

  • CVE-2025-38184Jul 4, 2025
    affected < 5.14.21-150500.55.121.2fixed 5.14.21-150500.55.121.2

    In the Linux kernel, the following vulnerability has been resolved: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer The reproduction steps: 1. create a tun interface 2. enable l2 bearer 3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun tipc: Started i

  • CVE-2025-38181Jul 4, 2025
    affected < 5.14.21-150500.55.116.1fixed 5.14.21-150500.55.116.1

    In the Linux kernel, the following vulnerability has been resolved: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). syzkaller reported a null-ptr-deref in sock_omalloc() while allocating a CALIPSO option. [0] The NULL is of struct sock, which was fetched by sk_to_

  • CVE-2025-38180Jul 4, 2025
    affected < 5.14.21-150500.55.121.2fixed 5.14.21-150500.55.121.2

    In the Linux kernel, the following vulnerability has been resolved: net: atm: fix /proc/net/atm/lec handling /proc/net/atm/lec must ensure safety against dev_lec[] changes. It appears it had dev_put() calls without prior dev_hold(), leading to imbalance and UAF.

  • CVE-2025-38177Jul 4, 2025
    affected < 5.14.21-150500.55.121.2fixed 5.14.21-150500.55.121.2

    In the Linux kernel, the following vulnerability has been resolved: sch_hfsc: make hfsc_qlen_notify() idempotent hfsc_qlen_notify() is not idempotent either and not friendly to its callers, like fq_codel_dequeue(). Let's make it idempotent to ease qdisc_tree_reduce_backlog() ca

  • CVE-2025-38111HigJul 3, 2025
    affected < 5.14.21-150500.55.124.1fixed 5.14.21-150500.55.124.1

    In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of

  • CVE-2025-38159Jul 3, 2025
    affected < 5.14.21-150500.55.136.1fixed 5.14.21-150500.55.136.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds Set the size to 6 instead of 2, since 'para' array is passed to 'rtw_fw_bt_wifi_control(rtwdev, para[0], &para[1])', which reads 5 bytes:

  • CVE-2025-38129Jul 3, 2025
    affected < 5.14.21-150500.55.136.1fixed 5.14.21-150500.55.136.1

    In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free in page_pool_recycle_in_ring syzbot reported a uaf in page_pool_recycle_in_ring: BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 Read of

  • CVE-2025-38120Jul 3, 2025
    affected < 5.14.21-150500.55.121.2fixed 5.14.21-150500.55.121.2

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_set_pipapo_avx2: fix initial map fill If the first field doesn't cover the entire start map, then we must zero out the remainder, else we leak those bits into the next match round map. The early

  • CVE-2025-38088Jun 30, 2025
    affected < 5.14.21-150500.55.121.2fixed 5.14.21-150500.55.121.2

    In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap memtrace mmap issue has an out of bounds issue. This patch fixes the by checking that the requested mapping region size should stay within the

Page 51 of 231