VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Server 15 SP4-LTSS

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS

Vulnerabilities (2,830)

  • CVE-2022-50559Oct 22, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: fix memleak on platform_device_add() fails No error handling is performed when platform_device_add() fails. Add error processing before return, and modified the return value.

  • CVE-2022-50556Oct 22, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: drm: Fix potential null-ptr-deref due to drmm_mode_config_init() drmm_mode_config_init() will call drm_mode_create_standard_properties() and won't check the ret value. When drm_mode_create_standard_properties()

  • CVE-2025-39978Oct 15, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a

  • CVE-2025-39977Oct 15, 2025
    affected < 5.14.21-150400.24.194.1fixed 5.14.21-150400.24.194.1

    In the Linux kernel, the following vulnerability has been resolved: futex: Prevent use-after-free during requeue-PI syzbot managed to trigger the following race: T1 T2 futex_wait_requeue_pi() futex_do_wait() schedule()

  • CVE-2025-39973Oct 15, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: i40e: add validation for ring_len param The `ring_len` parameter provided by the virtual function (VF) is assigned directly to the hardware memory context (HMC) without any validation. To address this, introdu

  • CVE-2025-39968Oct 15, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: i40e: add max boundary check for VF filters There is no check for max filters that VF can request. Add it.

  • CVE-2025-39967Oct 15, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: fbcon: fix integer overflow in fbcon_do_set_font Fix integer overflow vulnerabilities in fbcon_do_set_font() where font size calculations could overflow when handling user-controlled font parameters. The vulne

  • CVE-2025-39965Oct 13, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI x->id.spi == 0 means "no SPI assigned", but since commit 94f39804d891 ("xfrm: Duplicate SPI Handling"), we now create states and add them to the byspi list with this

  • CVE-2023-53673HigOct 7, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: call disconnect callback before deleting conn In hci_cs_disconnect, we do hci_conn_del even if disconnection failed. ISO, L2CAP and SCO connections refer to the hci_conn without hci_conn_

  • CVE-2023-53687Oct 7, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk When the best clk is searched, we iterate over all possible clk. If we find a better match, the previous one, if any, n

  • CVE-2023-53683Oct 7, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() syzbot is hitting WARN_ON() in hfsplus_cat_{read,write}_inode(), for crafted filesystem image can contain bogus length. There conditions are n

  • CVE-2023-53681Oct 7, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent In some specific situations, the return value of __bch_btree_node_alloc may be NULL. This may lead to a potential NULL pointer derefere

  • CVE-2023-53680Oct 7, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL OPDESC() simply indexes into nfsd4_ops[] by the op's operation number, without range checking that value. It assumes callers are careful to avoid calli

  • CVE-2023-53679Oct 7, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: mt7601u: fix an integer underflow Fix an integer underflow that leads to a null pointer dereference in 'mt7601u_rx_skb_from_seg()'. The variable 'dma_len' in the URB packet could be manipulated, which cou

  • CVE-2023-53676Oct 7, 2025
    affected < 5.14.21-150400.24.187.3fixed 5.14.21-150400.24.187.3

    In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() The function lio_target_nacl_info_show() uses sprintf() in a loop to print details for every iSCSI connection in a session without checkin

  • CVE-2023-53675Oct 7, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: ses: Fix possible desc_ptr out-of-bounds accesses Sanitize possible desc_ptr out-of-bounds accesses in ses_enclosure_data_process().

  • CVE-2023-53674Oct 7, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: clk: Fix memory leak in devm_clk_notifier_register() devm_clk_notifier_register() allocates a devres resource for clk notifier but didn't register that to the device, so the notifier didn't get unregistered on

  • CVE-2023-53670Oct 7, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: nvme-core: fix dev_pm_qos memleak Call dev_pm_qos_hide_latency_tolerance() in the error unwind patch to avoid following kmemleak:- blktests (master) # kmemleak-clear; ./check nvme/044; blktests (master) # kmem

  • CVE-2023-53668Oct 7, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Fix deadloop issue on reading trace_pipe Soft lockup occurs when reading file 'trace_pipe': watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cat:4488] [...] RIP: 0010:ring_buffer_empty_cpu

  • CVE-2023-53667Oct 7, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize Currently in cdc_ncm_check_tx_max(), if dwNtbOutMaxSize is lower than the calculated "min" value, but greater than zero, the logic sets tx_max to dwNtbO

Page 21 of 142