VYPR

rpm package

suse/kernel-default-base&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP5

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5

Vulnerabilities (2,310)

  • CVE-2025-71089HigJan 13, 2026
    affected < 5.14.21-150500.55.136.1.150500.6.67.1fixed 5.14.21-150500.55.136.1.150500.6.67.1

    In the Linux kernel, the following vulnerability has been resolved: iommu: disable SVA when CONFIG_X86 is set Patch series "Fix stale IOTLB entries for kernel address space", v7. This proposes a fix for a security vulnerability related to IOMMU Shared Virtual Addressing (SVA).

  • CVE-2025-71066Jan 13, 2026
    affected < 5.14.21-150500.55.141.1.150500.6.69.2fixed 5.14.21-150500.55.141.1.150500.6.69.2

    In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change zdi-disclosures@trendmicro.com says: The vulnerability is a race condition between `ets_qdisc_dequeue` and `ets_qdisc_ch

  • CVE-2025-68818Jan 13, 2026
    affected < 5.14.21-150500.55.144.1.150500.6.71.1fixed 5.14.21-150500.55.144.1.150500.6.71.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: qla2xxx: Perform lockless command completion in abort path" This reverts commit 0367076b0817d5c75dfb83001ce7ce5c64d803a9. The commit being reverted added code to __qla2x00_abort_all_cmds()

  • CVE-2025-68813Jan 13, 2026
    affected < 5.14.21-150500.55.136.1.150500.6.67.1fixed 5.14.21-150500.55.136.1.150500.6.67.1

    In the Linux kernel, the following vulnerability has been resolved: ipvs: fix ipv4 null-ptr-deref in route error path The IPv4 code path in __ip_vs_get_out_rt() calls dst_link_failure() without ensuring skb->dev is set, leading to a NULL pointer dereference in fib_compute_spec_

  • CVE-2025-68771Jan 13, 2026
    affected < 5.14.21-150500.55.136.1.150500.6.67.1fixed 5.14.21-150500.55.136.1.150500.6.67.1

    In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix kernel BUG in ocfs2_find_victim_chain syzbot reported a kernel BUG in ocfs2_find_victim_chain() because the `cl_next_free_rec` field of the allocation chain list (next free slot in the chain list) is

  • CVE-2025-71085Jan 13, 2026
    affected < 5.14.21-150500.55.136.1.150500.6.67.1fixed 5.14.21-150500.55.136.1.150500.6.67.1

    In the Linux kernel, the following vulnerability has been resolved: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() There exists a kernel oops caused by a BUG_ON(nhead < 0) at net/core/skbuff.c:2232 in pskb_expand_head(). This bug is triggered as part of t

  • CVE-2023-54326Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: misc: pci_endpoint_test: Free IRQs before removing the device In pci_endpoint_test_remove(), freeing the IRQs after removing the device creates a small race window for IRQs to be received with the test device m

  • CVE-2023-54325Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: qat - fix out-of-bounds read When preparing an AER-CTR request, the driver copies the key provided by the user into a data structure that is accessible by the firmware. If the target device is QAT GEN4,

  • CVE-2023-54322Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: arm64: set __exception_irq_entry with __irq_entry as a default filter_irq_stacks() is supposed to cut entries which are related irq entries from its call stack. And in_irqentry_text() which is called by filter_

  • CVE-2023-54320Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2() Function amd_pmc_stb_debugfs_open_v2() may be called when the STB debug mechanism enabled. When amd_pmc_send_cmd() fails, the 'buf' needs

  • CVE-2023-54319Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: pinctrl: at91-pio4: check return value of devm_kasprintf() devm_kasprintf() returns a pointer to dynamically allocated memory. Pointer could be NULL in case allocation fails. Check pointer validity. Identified

  • CVE-2023-54317Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: dm flakey: don't corrupt the zero page When we need to zero some range on a block device, the function __blkdev_issue_zero_pages submits a write bio with the bio vector pointing to the zero page. If we use dm-f

  • CVE-2023-54315Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv/sriov: perform null check on iov before dereferencing iov Currently pointer iov is being dereferenced before the null check of iov which can lead to null pointer dereference errors. Fix this by

  • CVE-2023-54311Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix deadlock when converting an inline directory in nojournal mode In no journal mode, ext4_finish_convert_inline_dir() can self-deadlock by calling ext4_handle_dirty_dirblock() when it already has taken

  • CVE-2023-54309Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation /dev/vtpmx is made visible before 'workqueue' is initialized, which can lead to a memory corruption in the worst case scenario. Address this by

  • CVE-2023-54305Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: refuse to create ea block when umounted The ea block expansion need to access s_root while it is already set as NULL when umount is triggered. Refuse this request to avoid panic.

  • CVE-2023-54304Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: firmware: meson_sm: fix to avoid potential NULL pointer dereference of_match_device() may fail and returns a NULL pointer. Fix this by checking the return value of of_match_device.

  • CVE-2023-54302Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix data race on CQP completion stats CQP completion statistics is read lockesly in irdma_wait_event and irdma_check_cqp_progress while it can be updated in the completion thread irdma_sc_ccq_get_cq

  • CVE-2023-54301Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: serial: 8250_bcm7271: fix leak in `brcmuart_probe` Smatch reports: drivers/tty/serial/8250/8250_bcm7271.c:1120 brcmuart_probe() warn: 'baud_mux_clk' from clk_prepare_enable() not released on lines: 1032. The i

  • CVE-2023-54300Dec 30, 2025
    affected < 5.14.21-150500.55.133.1.150500.6.65.1fixed 5.14.21-150500.55.133.1.150500.6.65.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx For the reasons also described in commit b383e8abed41 ("wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()"), ath9k_htc_rx_msg() should

Page 2 of 116