rpm package
suse/kernel-default&distro=SUSE Linux Enterprise Module for Legacy 15 SP7
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP7
Vulnerabilities (2,262)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-68795 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing userspace buffer on stats query The ethtool -S command operates across three ioctl calls: ETHTOOL_GSSET_INFO for the size, ETHTOOL_GSTRINGS for the names, and ETHTOOL_GSTATS for the v | ||
| CVE-2025-68788 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: fsnotify: do not generate ACCESS/MODIFY events on child for special files inotify/fanotify do not allow users with no read access to a file to subscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow t | ||
| CVE-2025-68785 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix middle attribute validation in push_nsh() action The push_nsh() action structure looks like this: OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...)) The outermost OVS | ||
| CVE-2025-68783 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-mixer: us16x08: validate meter packet indices get_meter_levels_from_urb() parses the 64-byte meter packets sent by the device and fills the per-channel arrays meter_level[], comp_level[] and master_le | ||
| CVE-2025-68778 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: btrfs: don't log conflicting inode if it's a dir moved in the current transaction We can't log a conflicting inode if it's a directory and it was moved from one parent directory to another parent directory in t | ||
| CVE-2025-68777 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: Input: ti_am335x_tsc - fix off-by-one error in wire_order validation The current validation 'wire_order[i] > ARRAY_SIZE(config_pins)' allows wire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-b | ||
| CVE-2025-68776 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() prp_get_untagged_frame() calls __pskb_copy() to create frame->skb_std but doesn't check if the allocation failed. If __pskb_copy() returns NULL, | ||
| CVE-2025-68775 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: net/handshake: duplicate handshake cancellations leak socket When a handshake request is cancelled it is removed from the handshake_net->hn_requests list, but it is still present in the handshake_rhashtbl until | ||
| CVE-2025-68773 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: spi: fsl-cpm: Check length parity before switching to 16 bit mode Commit fc96ec826bce ("spi: fsl-cpm: Use 16 bit mode for large transfers with even size") failed to make sure that the size is really even before | ||
| CVE-2025-68771 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix kernel BUG in ocfs2_find_victim_chain syzbot reported a kernel BUG in ocfs2_find_victim_chain() because the `cl_next_free_rec` field of the allocation chain list (next free slot in the chain list) is | ||
| CVE-2025-68770 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix XDP_TX path For XDP_TX action in bnxt_rx_xdp(), clearing of the event flags is not correct. __bnxt_poll_work() -> bnxt_rx_pkt() -> bnxt_rx_xdp() may be looping within NAPI and some event flags may | ||
| CVE-2025-68768 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: inet: frags: flush pending skbs in fqdir_pre_exit() We have been seeing occasional deadlocks on pernet_ops_rwsem since September in NIPA. The stuck task was usually modprobe (often loading a driver like ipvlan) | ||
| CVE-2025-71101 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing The hp_populate_*_elements_from_package() functions in the hp-bioscfg driver contain out-of-bounds array access vulnerabilities. | ||
| CVE-2025-71100 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc() TID getting from ieee80211_get_tid() might be out of range of array size of sta_entry->tids[], so check TID is less than MAX_TID_COUNT. Othw | ||
| CVE-2025-71099 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl() In xe_oa_add_config_ioctl(), we accessed oa_config->id after dropping metrics_lock. Since this lock protects the lifetime of oa_config, an attacker could | ||
| CVE-2025-71098 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: ip6_gre: make ip6gre_header() robust Over the years, syzbot found many ways to crash the kernel in ip6gre_header() [1]. This involves team or bonding drivers ability to dynamically change their dev->needed_hea | ||
| CVE-2025-71097 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix reference count leak when using error routes with nexthop objects When a nexthop object is deleted, it is marked as dead and then fib_table_flush() is called to flush all the routes that are using the | ||
| CVE-2025-71096 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly The netlink response for RDMA_NL_LS_OP_IP_RESOLVE should always have a LS_NLA_TYPE_DGID attribute, it is invalid if it does not. Use the nl parsi | ||
| CVE-2025-71095 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix the crash issue for zero copy XDP_TX action There is a crash issue when running zero copy XDP_TX action, the crash log is shown below. [ 216.122464] Unable to handle kernel paging request at | ||
| CVE-2025-71094 | — | < 6.4.0-150700.53.31.1 | 6.4.0-150700.53.31.1 | Jan 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: net: usb: asix: validate PHY address before use The ASIX driver reads the PHY address from the USB device via asix_read_phy_addr(). A malicious or faulty device can return an invalid address (>= PHY_MAX_ADDR), |
- CVE-2025-68795Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing userspace buffer on stats query The ethtool -S command operates across three ioctl calls: ETHTOOL_GSSET_INFO for the size, ETHTOOL_GSTRINGS for the names, and ETHTOOL_GSTATS for the v
- CVE-2025-68788Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: fsnotify: do not generate ACCESS/MODIFY events on child for special files inotify/fanotify do not allow users with no read access to a file to subscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow t
- CVE-2025-68785Jan 13, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix middle attribute validation in push_nsh() action The push_nsh() action structure looks like this: OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...)) The outermost OVS
- CVE-2025-68783Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-mixer: us16x08: validate meter packet indices get_meter_levels_from_urb() parses the 64-byte meter packets sent by the device and fills the per-channel arrays meter_level[], comp_level[] and master_le
- CVE-2025-68778Jan 13, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: btrfs: don't log conflicting inode if it's a dir moved in the current transaction We can't log a conflicting inode if it's a directory and it was moved from one parent directory to another parent directory in t
- CVE-2025-68777Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: Input: ti_am335x_tsc - fix off-by-one error in wire_order validation The current validation 'wire_order[i] > ARRAY_SIZE(config_pins)' allows wire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-b
- CVE-2025-68776Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() prp_get_untagged_frame() calls __pskb_copy() to create frame->skb_std but doesn't check if the allocation failed. If __pskb_copy() returns NULL,
- CVE-2025-68775Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: net/handshake: duplicate handshake cancellations leak socket When a handshake request is cancelled it is removed from the handshake_net->hn_requests list, but it is still present in the handshake_rhashtbl until
- CVE-2025-68773Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: spi: fsl-cpm: Check length parity before switching to 16 bit mode Commit fc96ec826bce ("spi: fsl-cpm: Use 16 bit mode for large transfers with even size") failed to make sure that the size is really even before
- CVE-2025-68771Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix kernel BUG in ocfs2_find_victim_chain syzbot reported a kernel BUG in ocfs2_find_victim_chain() because the `cl_next_free_rec` field of the allocation chain list (next free slot in the chain list) is
- CVE-2025-68770Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix XDP_TX path For XDP_TX action in bnxt_rx_xdp(), clearing of the event flags is not correct. __bnxt_poll_work() -> bnxt_rx_pkt() -> bnxt_rx_xdp() may be looping within NAPI and some event flags may
- CVE-2025-68768Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: inet: frags: flush pending skbs in fqdir_pre_exit() We have been seeing occasional deadlocks on pernet_ops_rwsem since September in NIPA. The stuck task was usually modprobe (often loading a driver like ipvlan)
- CVE-2025-71101Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing The hp_populate_*_elements_from_package() functions in the hp-bioscfg driver contain out-of-bounds array access vulnerabilities.
- CVE-2025-71100Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc() TID getting from ieee80211_get_tid() might be out of range of array size of sta_entry->tids[], so check TID is less than MAX_TID_COUNT. Othw
- CVE-2025-71099Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl() In xe_oa_add_config_ioctl(), we accessed oa_config->id after dropping metrics_lock. Since this lock protects the lifetime of oa_config, an attacker could
- CVE-2025-71098Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: ip6_gre: make ip6gre_header() robust Over the years, syzbot found many ways to crash the kernel in ip6gre_header() [1]. This involves team or bonding drivers ability to dynamically change their dev->needed_hea
- CVE-2025-71097Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix reference count leak when using error routes with nexthop objects When a nexthop object is deleted, it is marked as dead and then fib_table_flush() is called to flush all the routes that are using the
- CVE-2025-71096Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly The netlink response for RDMA_NL_LS_OP_IP_RESOLVE should always have a LS_NLA_TYPE_DGID attribute, it is invalid if it does not. Use the nl parsi
- CVE-2025-71095Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix the crash issue for zero copy XDP_TX action There is a crash issue when running zero copy XDP_TX action, the crash log is shown below. [ 216.122464] Unable to handle kernel paging request at
- CVE-2025-71094Jan 13, 2026affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1
In the Linux kernel, the following vulnerability has been resolved: net: usb: asix: validate PHY address before use The ASIX driver reads the PHY address from the USB device via asix_read_phy_addr(). A malicious or faulty device can return an invalid address (>= PHY_MAX_ADDR),
Page 11 of 114