VYPR

rpm package

suse/kernel-default-base&distro=SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS

Vulnerabilities (2,310)

  • CVE-2023-53850Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: iavf: use internal state to free traffic IRQs If the system tries to close the netdev while iavf_reset_task() is running, __LINK_STATE_START will be cleared and netif_running() will return false in iavf_reinit_

  • CVE-2023-53849Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix workqueue leak on bind errors Make sure to destroy the workqueue also in case of early errors during bind (e.g. a subcomponent failing to bind). Since commit c3b790ea07a1 ("drm: Manage drm_mode_co

  • CVE-2023-53848Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: md/raid5-cache: fix a deadlock in r5l_exit_log() Commit b13015af94cf ("md/raid5-cache: Clear conf->log after finishing work") introduce a new problem: // caller hold reconfig_mutex r5l_exit_log flush_work(&lo

  • CVE-2023-53847Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: usb-storage: alauda: Fix uninit-value in alauda_check_media() Syzbot got KMSAN to complain about access to an uninitialized value in the alauda subdriver of usb-storage: BUG: KMSAN: uninit-value in alauda_tran

  • CVE-2023-53845Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix infinite loop in nilfs_mdt_get_block() If the disk image that nilfs2 mounts is corrupted and a virtual block address obtained by block lookup for a metadata file is invalid, nilfs_bmap_lookup_at_lev

  • CVE-2023-53844Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Don't leak a resource on swapout move error If moving the bo to system for swapout failed, we were leaking a resource. Fix.

  • CVE-2023-53842Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove The MBHC resources must be released on component probe failure and removal so can not be tied to the lifetime of the component device. This is

  • CVE-2023-53840Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: usb: early: xhci-dbc: Fix a potential out-of-bound memory access If xdbc_bulk_write() fails, the values in 'buf' can be anything. So the string is not guaranteed to be NULL terminated when xdbc_trace() is calle

  • CVE-2023-53837Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix NULL-deref on snapshot tear down In case of early initialisation errors and on platforms that do not use the DPU controller, the deinitilisation code can be called with the kms pointer set to NULL.

  • CVE-2023-53834Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: iio: adc: ina2xx: avoid NULL pointer dereference on OF device match The affected lines were resulting in a NULL pointer dereference on our platform because the device tree contained the following list of compat

  • CVE-2023-53833Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix NULL ptr deref by checking new_crtc_state intel_atomic_get_new_crtc_state can return NULL, unless crtc state wasn't obtained previously with intel_atomic_get_crtc_state, so we must check it for NU

  • CVE-2023-53832Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix null-ptr-deref in raid10_sync_request init_resync() inits mempool and sets conf->have_replacemnt at the beginning of sync, close_sync() frees the mempool when sync is completed. After [1] recove

  • CVE-2023-53830Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: platform/x86: think-lmi: Fix memory leak when showing current settings When retriving a item string with tlmi_setting(), the result has to be freed using kfree(). In current_value_show() however, malformed item

  • CVE-2023-53828Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() KSAN reports use-after-free in hci_add_adv_monitor(). While adding an adv monitor, hci_add_adv_monitor() calls -> msft_add_mon

  • CVE-2023-53827Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} Similar to commit d0be8347c623 ("Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put"), just use l2cap_chan_hold_unless_zero to preve

  • CVE-2023-53820Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: loop: loop_set_status_from_info() check before assignment In loop_set_status_from_info(), lo->lo_offset and lo->lo_sizelimit should be checked before reassignment, because if an overflow error occurs, the origi

  • CVE-2022-50679Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: i40e: Fix DMA mappings leak During reallocation of RX buffers, new DMA mappings are created for those buffers. steps for reproduction: while : do for ((i=0; i<=8160; i=i+32)) do ethtool -G enp130s0f0 rx $i tx

  • CVE-2022-50678Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix invalid address access when enabling SCAN log level The variable i is changed when setting random MAC address and causes invalid address access when printing the value of pi->reqs[i]->reqid.

  • CVE-2022-50677Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: ipmi: fix use after free in _ipmi_destroy_user() The intf_free() function frees the "intf" pointer so we cannot dereference it again on the next line.

  • CVE-2022-50675Dec 9, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored Prior to commit 69e3b846d8a7 ("arm64: mte: Sync tags for pages where PTE is untagged"), mte_sync_tags() was only called for pte_tagged() en

Page 17 of 116