VYPR

rpm package

suse/kernel-default-base&distro=SUSE Manager Proxy 4.3

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Manager%20Proxy%204.3

Vulnerabilities (1,907)

  • CVE-2022-49772May 1, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() snd_usbmidi_output_open() has a check of the NULL port with snd_BUG_ON(). snd_BUG_ON() was used as this shouldn't have happened, but in reality

  • CVE-2022-49771May 1, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: dm ioctl: fix misbehavior if list_versions races with module loading __list_versions will first estimate the required space using the "dm_target_iterate(list_version_get_needed, &needed)" call and then will fil

  • CVE-2022-49770May 1, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: ceph: avoid putting the realm twice when decoding snaps fails When decoding the snaps fails it maybe leaving the 'first_realm' and 'realm' pointing to the same snaprealm memory. And then it'll put it twice and

  • CVE-2022-49769May 1, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: gfs2: Check sb_bsize_shift after reading superblock Fuzzers like to scribble over sb_bsize_shift but in reality it's very unlikely that this field would be corrupted on its own. Nevertheless it should be checke

  • CVE-2022-49767May 1, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: 9p/trans_fd: always use O_NONBLOCK read/write syzbot is reporting hung task at p9_fd_close() [1], for p9_mux_poll_stop() from p9_conn_destroy() from p9_fd_close() is failing to interrupt already started kernel

  • CVE-2025-37789May 1, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first.

  • CVE-2025-37752May 1, 2025
    affected < 5.14.21-150400.24.170.2.150400.24.86.2fixed 5.14.21-150400.24.170.2.150400.24.86.2

    In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the c

  • CVE-2025-23145May 1, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: mptcp: fix NULL pointer in can_accept_new_subflow When testing valkey benchmark tool with MPTCP, the kernel panics in 'mptcp_can_accept_new_subflow' because subflow_req->msk is NULL. Call trace: mptcp_can_a

  • CVE-2025-23141May 1, 2025
    affected < 5.14.21-150400.24.170.2.150400.24.86.2fixed 5.14.21-150400.24.170.2.150400.24.86.2

    In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses Acquire a lock on kvm->srcu when userspace is getting MP state to handle a rather extreme edge case where "accepting" APIC events, i.e

  • CVE-2025-37785Apr 18, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix OOB read when checking dotdot dir Mounting a corrupted filesystem with directory which contains '.' dir entry with rec_len == block size results in out-of-bounds read (later on, when the corrupted dir

  • CVE-2021-47671Apr 17, 2025
    affected < 5.14.21-150400.24.164.1.150400.24.82.1fixed 5.14.21-150400.24.164.1.150400.24.82.1

    In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path In es58x_rx_err_msg(), if can->do_set_mode() fails, the function directly returns without calling netif_rx(skb). This means that the skb previo

  • CVE-2025-23138Apr 16, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: watch_queue: fix pipe accounting mismatch Currently, watch_queue_set_size() modifies the pipe buffers charged to user->pipe_bufs without updating the pipe->nr_accounted on the pipe itself, due to the if (!pipe_

  • CVE-2025-22097Apr 16, 2025
    affected < 5.14.21-150400.24.164.1.150400.24.82.1fixed 5.14.21-150400.24.164.1.150400.24.82.1

    In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it.

  • CVE-2025-22060Apr 16, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: net: mvpp2: Prevent parser TCAM memory corruption Protect the parser TCAM/SRAM memory, and the cached (shadow) SRAM information, from concurrent modifications. Both the TCAM and SRAM tables are indirectly acce

  • CVE-2025-22056Apr 16, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_tunnel: fix geneve_opt type confusion addition When handling multiple NFTA_TUNNEL_KEY_OPTS_GENEVE attributes, the parsing logic should place every geneve_opt structure one by one compactly. Hence

  • CVE-2025-22055Apr 16, 2025
    affected < 5.14.21-150400.24.164.1.150400.24.82.1fixed 5.14.21-150400.24.164.1.150400.24.82.1

    In the Linux kernel, the following vulnerability has been resolved: net: fix geneve_opt length integer overflow struct geneve_opt uses 5 bit length for each single option, which means every vary size option should be smaller than 128 bytes. However, all current related Netlink

  • CVE-2025-22045Apr 16, 2025
    affected < 5.14.21-150400.24.164.1.150400.24.82.1fixed 5.14.21-150400.24.164.1.150400.24.82.1

    In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs On the following path, flush_tlb_range() can be used for zapping normal PMD entries (PMD entries that point to page tables) together with the PTE

  • CVE-2025-22020Apr 16, 2025
    affected < 5.14.21-150400.24.164.1.150400.24.82.1fixed 5.14.21-150400.24.164.1.150400.24.82.1

    In the Linux kernel, the following vulnerability has been resolved: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in rt

  • CVE-2025-22004Apr 3, 2025
    affected < 5.14.21-150400.24.164.1.150400.24.82.1fixed 5.14.21-150400.24.164.1.150400.24.82.1

    In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so save the length before calling ->send() to avoid a use after free.

  • CVE-2025-21999Apr 3, 2025
    affected < 5.14.21-150400.24.167.1.150400.24.84.1fixed 5.14.21-150400.24.167.1.150400.24.84.1

    In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc

Page 17 of 96