VYPR

rpm package

suse/kernel-default-base&distro=SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS

Vulnerabilities (2,310)

  • CVE-2025-37798May 2, 2025
    affected < 5.14.21-150500.55.113.1.150500.6.53.1fixed 5.14.21-150500.55.113.1.150500.6.53.1

    In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making all ->qlen_notify() callbacks idempotent, now it is safe to remove the check of qlen!=0 from both fq_codel_dequeue() and codel_qdi

  • CVE-2025-37797May 2, 2025
    affected < 5.14.21-150500.55.116.1.150500.6.55.1fixed 5.14.21-150500.55.116.1.150500.6.55.1

    In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc

  • CVE-2022-49931May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Correctly move list in sc_disable() Commit 13bac861952a ("IB/hfi1: Fix abba locking issue with sc_disable()") incorrectly tries to move a list from one list head to another. The result is a kernel cra

  • CVE-2022-49929May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix mr leak in RESPST_ERR_RNR rxe_recheck_mr() will increase mr's ref_cnt, so we should call rxe_put(mr) to drop mr's ref_cnt in RESPST_ERR_RNR to avoid below warning: WARNING: CPU: 0 PID: 4156 at

  • CVE-2022-49928May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed There is a null-ptr-deref when xps sysfs alloc failed: BUG: KASAN: null-ptr-deref in sysfs_do_create_link_sd+0x40/0xd0 Read of size 8 at addr 000000000

  • CVE-2022-49927May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: nfs4: Fix kmemleak when allocate slot failed If one of the slot allocate failed, should cleanup all the other allocated slots, otherwise, the allocated slots will leak: unreferenced object 0xffff8881115aa100

  • CVE-2022-49925May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix null-ptr-deref in ib_core_cleanup() KASAN reported a null-ptr-deref error: KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f] CPU: 1 PID: 379 Hardware name: QEMU Standa

  • CVE-2022-49924May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: nfc: fdp: Fix potential memory leak in fdp_nci_send() fdp_nci_send() will call fdp_nci_i2c_write that will not free skb in the function. As a result, when fdp_nci_i2c_write() finished, the skb will memleak. fdp

  • CVE-2022-49923May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() nxp_nci_send() will call nxp_nci_i2c_write(), and only free skb when nxp_nci_i2c_write() failed. However, even if the nxp_nci_i2c_write() run succeeds,

  • CVE-2022-49922May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() nfcmrvl_i2c_nci_send() will be called by nfcmrvl_nci_send(), and skb should be freed in nfcmrvl_i2c_nci_send(). However, nfcmrvl_nci_send() will

  • CVE-2022-49921May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: net: sched: Fix use after free in red_enqueue() We can't use "skb" again after passing it to qdisc_enqueue(). This is basically identical to commit 2f09707d0c97 ("sch_sfb: Also store skb len before calling chi

  • CVE-2022-49918May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: ipvs: fix WARNING in __ip_vs_cleanup_batch() During the initialization of ip_vs_conn_net_init(), if file ip_vs_conn or ip_vs_conn_sync fails to be created, the initialization is successful by default. Therefore

  • CVE-2022-49917May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: ipvs: fix WARNING in ip_vs_app_net_cleanup() During the initialization of ip_vs_app_net_init(), if file ip_vs_app fails to be created, the initialization is successful by default. Therefore, the ip_vs_app file

  • CVE-2022-49916May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: rose: Fix NULL pointer dereference in rose_send_frame() The syzkaller reported an issue: KASAN: null-ptr-deref in range [0x0000000000000380-0x0000000000000387] CPU: 0 PID: 4069 Comm: kworker/0:15 Not tainted 6

  • CVE-2022-49915May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: mISDN: fix possible memory leak in mISDN_register_device() Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, add put_device()

  • CVE-2022-49910May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu Fix the race condition between the following two flows that run in parallel: 1. l2cap_reassemble_sdu -> chan->ops->recv (l2cap_sock_recv_cb)

  • CVE-2022-49908May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix memory leak in vhci_write Syzkaller reports a memory leak as follows: ==================================== BUG: memory leak unreferenced object 0xffff88810d81ac00 (size 240): [...] hex

  • CVE-2022-49906May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Free rwi on reset success Free the rwi structure in the event that the last rwi in the list processed successfully. The logic in commit 4f408e1fa6e1 ("ibmvnic: retry reset if there are no other resets"

  • CVE-2022-49905May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix possible leaked pernet namespace in smc_init() In smc_init(), register_pernet_subsys(&smc_net_stat_ops) is called without any error handling. If it fails, registering of &smc_net_ops won't be rever

  • CVE-2022-49902May 1, 2025
    affected < 5.14.21-150500.55.110.1.150500.6.51.3fixed 5.14.21-150500.55.110.1.150500.6.51.3

    In the Linux kernel, the following vulnerability has been resolved: block: Fix possible memory leak for rq_wb on add_disk failure kmemleak reported memory leaks in device_add_disk(): kmemleak: 3 new suspected memory leaks unreferenced object 0xffff88800f420800 (size 512): c

Page 67 of 116