VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Module for Legacy 15 SP7

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP7

Vulnerabilities (2,262)

  • CVE-2025-38259Jul 9, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd9335: Fix missing free of regulator supplies Driver gets and enables all regulator supplies in probe path (wcd9335_parse_dt() and wcd9335_power_on_reset()), but does not cleanup in final error

  • CVE-2025-38257Jul 9, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Prevent overflow in size calculation for memdup_user() Number of apqn target list entries contained in 'nr_apqns' variable is determined by userspace via an ioctl call so the result of the product in

  • CVE-2025-38256Jul 9, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: io_uring/rsrc: fix folio unpinning syzbot complains about an unmapping failure: [ 108.070381][ T14] kernel BUG at mm/gup.c:71! [ 108.070502][ T14] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP [

  • CVE-2025-38255Jul 9, 2025
    affected < 6.4.0-150700.53.19.1fixed 6.4.0-150700.53.19.1

    In the Linux kernel, the following vulnerability has been resolved: lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly() While testing null_blk with configfs, echo 0 > poll_queues will trigger following panic: BUG: kernel NULL pointer dereference, address: 000

  • CVE-2025-38251Jul 9, 2025
    affected < 6.4.0-150700.53.16.1fixed 6.4.0-150700.53.16.1

    In the Linux kernel, the following vulnerability has been resolved: atm: clip: prevent NULL deref in clip_push() Blamed commit missed that vcc_destroy_socket() calls clip_push() with a NULL skb. If clip_devs is NULL, clip_push() then crashes when reading skb->truesize.

  • CVE-2025-38250Jul 9, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix use-after-free in vhci_flush() syzbot reported use-after-free in vhci_flush() without repro. [0] From the splat, a thread close()d a vhci file descriptor while its device was being use

  • CVE-2025-38249Jul 9, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() In snd_usb_get_audioformat_uac3(), the length value returned from snd_usb_ctl_msg() is used directly for memory allocation without valid

  • CVE-2025-38248Jul 9, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: bridge: mcast: Fix use-after-free during router port configuration The bridge maintains a global list of ports behind which a multicast router resides. The list is consulted during forwarding to ensure multicas

  • CVE-2025-38246Jul 9, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: bnxt: properly flush XDP redirect lists We encountered following crash when testing a XDP_REDIRECT feature in production: [56251.579676] list_add corruption. next->prev should be prev (ffff93120dd40f30), but w

  • CVE-2025-38245Jul 9, 2025
    affected < 6.4.0-150700.53.16.1fixed 6.4.0-150700.53.16.1

    In the Linux kernel, the following vulnerability has been resolved: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). syzbot reported a warning below during atm_dev_register(). [0] Before creating a new device and procfs/sysfs for it, atm_dev_register()

  • CVE-2025-38244Jul 9, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential deadlock when reconnecting channels Fix cifs_signal_cifsd_for_reconnect() to take the correct lock order and prevent the following deadlock from happening ===========================

  • CVE-2025-38243Jul 9, 2025
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: fix invalid inode pointer dereferences during log replay In a few places where we call read_one_inode(), if we get a NULL pointer we end up jumping into an error path, or fallthrough in case of __add_ino

  • CVE-2025-38239Jul 9, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix invalid node index On a system with DRAM interleave enabled, out-of-bound access is detected: megaraid_sas 0000:3f:00.0: requested/available msix 128/128 poll_queue 0 ------------[ cut

  • CVE-2025-38238Jul 9, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: fnic: Fix crash in fnic_wq_cmpl_handler when FDMI times out When both the RHBA and RPA FDMI requests time out, fnic reuses a frame to send ABTS for each of them. On send completion, this causes an attempt

  • CVE-2024-36357MedJul 8, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.

  • CVE-2024-36350MedJul 8, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.

  • CVE-2024-36349LowJul 8, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    A transient execution vulnerability in some AMD processors may allow a user process to infer TSC_AUX even when such a read is disabled, potentially resulting in information leakage.

  • CVE-2024-36348LowJul 8, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    A transient execution vulnerability in some AMD processors may allow a user process to infer the control registers speculatively even if UMIP feature is enabled, potentially resulting in information leakage.

  • CVE-2025-38236HigJul 8, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: af_unix: Don't leave consecutive consumed OOB skbs. Jann Horn reported a use-after-free in unix_stream_read_generic(). The following sequences reproduce the issue: $ python3 from socket import * s1, s2

  • CVE-2025-38231MedJul 4, 2025
    affected < 6.4.0-150700.53.11.1fixed 6.4.0-150700.53.11.1

    In the Linux kernel, the following vulnerability has been resolved: nfsd: Initialize ssc before laundromat_work to prevent NULL dereference In nfs4_state_start_net(), laundromat_work may access nfsd_ssc through nfs4_laundromat -> nfsd4_ssc_expire_umount. If nfsd_ssc isn't initi

Page 77 of 114