rpm package
suse/kernel-default-base&distro=SUSE Linux Enterprise Module for Basesystem 15 SP7
pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP7
Vulnerabilities (2,262)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-21980 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: sched: address a potential NULL pointer dereference in the GRED scheduler. If kzalloc in gred_init returns a NULL pointer, the code follows the error handling path, invoking gred_destroy. This, in turn, calls g | ||
| CVE-2025-21978 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/hyperv: Fix address space leak when Hyper-V DRM device is removed When a Hyper-V DRM device is probed, the driver allocates MMIO space for the vram, and maps it cacheable. If the device removed, or in the e | ||
| CVE-2025-21975 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: handle errors in mlx5_chains_create_table() In mlx5_chains_create_table(), the return value of mlx5_get_fdb_sub_ns() and mlx5_get_flow_namespace() must be checked to prevent NULL pointer dereferences. | ||
| CVE-2025-21974 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc() The bnxt_queue_mem_alloc() is called to allocate new queue memory when a queue is restarted. It internally accesses rx buffer descriptor cor | ||
| CVE-2025-21973 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix kernel panic in the bnxt_get_queue_stats{rx | tx} When qstats-get operation is executed, callbacks of netdev_stats_ops are called. The bnxt_get_queue_stats{rx | tx} collect per-queue stats from s | ||
| CVE-2025-21972 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: net: mctp: unshare packets when reassembling Ensure that the frag_list used for reassembly isn't shared with other packets. This avoids incorrect reassembly when packets are cloned, and prevents a memory leak d | ||
| CVE-2025-21971 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: net_sched: Prevent creation of classes with TC_H_ROOT The function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination condition when traversing up the qdisc tree to update parent backlog counters. Howe | ||
| CVE-2025-21970 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Bridge, fix the crash caused by LAG state check When removing LAG device from bridge, NETDEV_CHANGEUPPER event is triggered. Driver finds the lower devices (PFs) to flush all the offloaded entries. An | ||
| CVE-2025-21969 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd After the hci sync command releases l2cap_conn, the hci receive data work queue references the released l2cap_conn when sending to the upper laye | ||
| CVE-2025-21968 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix slab-use-after-free on hdcp_work [Why] A slab-use-after-free is reported when HDCP is destroyed but the property_validate_dwork queue is still running. [How] Cancel the delayed work when d | ||
| CVE-2025-21966 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature Fix memory corruption due to incorrect parameter being passed to bio_init | ||
| CVE-2025-21964 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acregmax mount option User-provided mount parameter acregmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from s | ||
| CVE-2025-21963 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acdirmax mount option User-provided mount parameter acdirmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from s | ||
| CVE-2025-21962 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing closetimeo mount option User-provided mount parameter closetimeo of type u32 is intended to have an upper limit, but before it is validated, the value is converted fr | ||
| CVE-2025-21961 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix truesize for mb-xdp-pass case When mb-xdp is set and return is XDP_PASS, packet is converted from xdp_buff to sk_buff with xdp_update_skb_shared_info() in bnxt_xdp_build_skb(). bnxt_xdp_build_skb | ||
| CVE-2025-21960 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() The bnxt_rx_pkt() updates ip_summed value at the end if checksum offload is enabled. When the XDP-MB program is attached and it returns XDP_PASS, the bn | ||
| CVE-2025-21959 | — | < 6.4.0-150700.53.6.1.150700.17.6.1 | 6.4.0-150700.53.6.1.150700.17.6.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree() Since commit b36e4523d4d5 ("netfilter: nf_conncount: fix garbage collection confirm race"), `cpu` and `jiffies32` were introd | ||
| CVE-2025-21957 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: qla1280: Fix kernel oops when debug level > 2 A null dereference or oops exception will eventually occur when qla1280.c driver is compiled with DEBUG_QLA1280 enabled and ql_debug_level > 2. I think its c | ||
| CVE-2025-21956 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Assign normalized_pix_clk when color depth = 14 [WHY & HOW] A warning message "WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397 calculate_phy_pix_clks+0xef/0x100 [amdgpu]" occurs because the | ||
| CVE-2025-21953 | — | < 6.4.0-150700.53.3.1.150700.17.2.1 | 6.4.0-150700.53.3.1.150700.17.2.1 | Apr 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: net: mana: cleanup mana struct after debugfs_remove() When on a MANA VM hibernation is triggered, as part of hibernate_snapshot(), mana_gd_suspend() and mana_gd_resume() are called. If during this mana_gd_resum |
- CVE-2025-21980Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: sched: address a potential NULL pointer dereference in the GRED scheduler. If kzalloc in gred_init returns a NULL pointer, the code follows the error handling path, invoking gred_destroy. This, in turn, calls g
- CVE-2025-21978Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: drm/hyperv: Fix address space leak when Hyper-V DRM device is removed When a Hyper-V DRM device is probed, the driver allocates MMIO space for the vram, and maps it cacheable. If the device removed, or in the e
- CVE-2025-21975Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: handle errors in mlx5_chains_create_table() In mlx5_chains_create_table(), the return value of mlx5_get_fdb_sub_ns() and mlx5_get_flow_namespace() must be checked to prevent NULL pointer dereferences.
- CVE-2025-21974Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc() The bnxt_queue_mem_alloc() is called to allocate new queue memory when a queue is restarted. It internally accesses rx buffer descriptor cor
- CVE-2025-21973Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix kernel panic in the bnxt_get_queue_stats{rx | tx} When qstats-get operation is executed, callbacks of netdev_stats_ops are called. The bnxt_get_queue_stats{rx | tx} collect per-queue stats from s
- CVE-2025-21972Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: net: mctp: unshare packets when reassembling Ensure that the frag_list used for reassembly isn't shared with other packets. This avoids incorrect reassembly when packets are cloned, and prevents a memory leak d
- CVE-2025-21971Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: net_sched: Prevent creation of classes with TC_H_ROOT The function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination condition when traversing up the qdisc tree to update parent backlog counters. Howe
- CVE-2025-21970Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Bridge, fix the crash caused by LAG state check When removing LAG device from bridge, NETDEV_CHANGEUPPER event is triggered. Driver finds the lower devices (PFs) to flush all the offloaded entries. An
- CVE-2025-21969Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd After the hci sync command releases l2cap_conn, the hci receive data work queue references the released l2cap_conn when sending to the upper laye
- CVE-2025-21968Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix slab-use-after-free on hdcp_work [Why] A slab-use-after-free is reported when HDCP is destroyed but the property_validate_dwork queue is still running. [How] Cancel the delayed work when d
- CVE-2025-21966Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature Fix memory corruption due to incorrect parameter being passed to bio_init
- CVE-2025-21964Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acregmax mount option User-provided mount parameter acregmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from s
- CVE-2025-21963Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acdirmax mount option User-provided mount parameter acdirmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from s
- CVE-2025-21962Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing closetimeo mount option User-provided mount parameter closetimeo of type u32 is intended to have an upper limit, but before it is validated, the value is converted fr
- CVE-2025-21961Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix truesize for mb-xdp-pass case When mb-xdp is set and return is XDP_PASS, packet is converted from xdp_buff to sk_buff with xdp_update_skb_shared_info() in bnxt_xdp_build_skb(). bnxt_xdp_build_skb
- CVE-2025-21960Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() The bnxt_rx_pkt() updates ip_summed value at the end if checksum offload is enabled. When the XDP-MB program is attached and it returns XDP_PASS, the bn
- CVE-2025-21959Apr 1, 2025affected < 6.4.0-150700.53.6.1.150700.17.6.1fixed 6.4.0-150700.53.6.1.150700.17.6.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree() Since commit b36e4523d4d5 ("netfilter: nf_conncount: fix garbage collection confirm race"), `cpu` and `jiffies32` were introd
- CVE-2025-21957Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: scsi: qla1280: Fix kernel oops when debug level > 2 A null dereference or oops exception will eventually occur when qla1280.c driver is compiled with DEBUG_QLA1280 enabled and ql_debug_level > 2. I think its c
- CVE-2025-21956Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Assign normalized_pix_clk when color depth = 14 [WHY & HOW] A warning message "WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397 calculate_phy_pix_clks+0xef/0x100 [amdgpu]" occurs because the
- CVE-2025-21953Apr 1, 2025affected < 6.4.0-150700.53.3.1.150700.17.2.1fixed 6.4.0-150700.53.3.1.150700.17.2.1
In the Linux kernel, the following vulnerability has been resolved: net: mana: cleanup mana struct after debugfs_remove() When on a MANA VM hibernation is triggered, as part of hibernate_snapshot(), mana_gd_suspend() and mana_gd_resume() are called. If during this mana_gd_resum
Page 101 of 114