VYPR

rpm package

suse/kernel-default-base&distro=SUSE Linux Enterprise Server 15 SP4-LTSS

pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS

Vulnerabilities (2,830)

  • CVE-2026-23274HigMar 20, 2026
    affected < 5.14.21-150400.24.200.1.150400.24.102.1fixed 5.14.21-150400.24.200.1.150400.24.102.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels IDLETIMER revision 0 rules reuse existing timers by label and always call mod_timer() on timer->timer. If the label was created first by revisio

  • CVE-2026-23272HigMar 20, 2026
    affected < 5.14.21-150400.24.200.1.150400.24.102.1fixed 5.14.21-150400.24.200.1.150400.24.102.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: unconditionally bump set->nelems before insertion In case that the set is full, a new element gets published then removed without waiting for the RCU grace period, while RCU reader can be

  • CVE-2026-23269HigMar 18, 2026
    affected < 5.14.21-150400.24.197.1.150400.24.100.1fixed 5.14.21-150400.24.197.1.150400.24.100.1

    In the Linux kernel, the following vulnerability has been resolved: apparmor: validate DFA start states are in bounds in unpack_pdb Start states are read from untrusted data and used as indexes into the DFA state tables. The aa_dfa_next() function call in unpack_pdb() will acce

  • CVE-2026-23268HigMar 18, 2026
    affected < 5.14.21-150400.24.197.1.150400.24.100.1fixed 5.14.21-150400.24.197.1.150400.24.100.1

    In the Linux kernel, the following vulnerability has been resolved: apparmor: fix unprivileged local user can do privileged policy management An unprivileged local user can load, replace, and remove profiles by opening the apparmorfs interfaces, via a confused deputy attack, by

  • CVE-2026-23243HigMar 18, 2026
    affected < 5.14.21-150400.24.200.1.150400.24.102.1fixed 5.14.21-150400.24.200.1.150400.24.102.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/umad: Reject negative data_len in ib_umad_write ib_umad_write computes data_len from user-controlled count and the MAD header sizes. With a mismatched user MAD header size and RMPP header length, data_len

  • CVE-2026-23209HigFeb 14, 2026
    affected < 5.14.21-150400.24.197.1.150400.24.100.1fixed 5.14.21-150400.24.197.1.150400.24.100.1

    In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice repro to crash the kernel: ip link add p1 type veth peer p2 ip link set address 00:00:00:00:00:20 dev p1 ip link set up dev p1 ip l

  • CVE-2026-23204HigFeb 14, 2026
    affected < 5.14.21-150400.24.197.1.150400.24.100.1fixed 5.14.21-150400.24.197.1.150400.24.100.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro f

  • CVE-2026-23191HigFeb 14, 2026
    affected < 5.14.21-150400.24.197.1.150400.24.100.1fixed 5.14.21-150400.24.197.1.150400.24.100.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access at PCM trigger The PCM trigger callback of aloop driver tries to check the PCM state and stop the stream of the tied substream in the corresponding cable. Since both check and stop

  • CVE-2026-23103HigFeb 4, 2026
    affected < 5.14.21-150400.24.200.1.150400.24.102.1fixed 5.14.21-150400.24.200.1.150400.24.102.1

    In the Linux kernel, the following vulnerability has been resolved: ipvlan: Make the addrs_lock be per port Make the addrs_lock be per port, not per ipvlan dev. Initial code seems to be written in the assumption, that any address change must occur under RTNL. But it is not so

  • CVE-2026-23074HigFeb 4, 2026
    affected < 5.14.21-150400.24.194.1.150400.24.98.3fixed 5.14.21-150400.24.194.1.150400.24.98.3

    In the Linux kernel, the following vulnerability has been resolved: net/sched: Enforce that teql can only be used as root qdisc Design intent of teql is that it is only supposed to be used as root qdisc. We need to check for that constraint. Although not important, I will desc

  • CVE-2026-23054Feb 4, 2026
    affected < 5.14.21-150400.24.197.1.150400.24.100.1fixed 5.14.21-150400.24.197.1.150400.24.100.1

    In the Linux kernel, the following vulnerability has been resolved: net: hv_netvsc: reject RSS hash key programming without RX indirection table RSS configuration requires a valid RX indirection table. When the device reports a single receive queue, rndis_filter_device_add() do

  • CVE-2026-23089Feb 4, 2026
    affected < 5.14.21-150400.24.194.1.150400.24.98.3fixed 5.14.21-150400.24.194.1.150400.24.98.3

    In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() When snd_usb_create_mixer() fails, snd_usb_mixer_free() frees mixer->id_elems but the controls already added to the card still reference the freed mem

  • CVE-2026-23060Feb 4, 2026
    affected < 5.14.21-150400.24.197.1.150400.24.100.1fixed 5.14.21-150400.24.197.1.150400.24.100.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than the minimum expected length, crypto_authenc_esn_decrypt()

  • CVE-2026-23004HigJan 25, 2026
    affected < 5.14.21-150400.24.197.1.150400.24.100.1fixed 5.14.21-150400.24.197.1.150400.24.100.1

    In the Linux kernel, the following vulnerability has been resolved: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() syzbot was able to crash the kernel in rt6_uncached_list_flush_dev() in an interesting way [1] Crash happens in list_del_init()/INIT_LIST_HE

  • CVE-2026-23001HigJan 25, 2026
    affected < 5.14.21-150400.24.194.1.150400.24.98.3fixed 5.14.21-150400.24.194.1.150400.24.98.3

    In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace

  • CVE-2026-22999HigJan 25, 2026
    affected < 5.14.21-150400.24.194.1.150400.24.98.3fixed 5.14.21-150400.24.194.1.150400.24.98.3

    In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: do not free existing class in qfq_change_class() Fixes qfq_change_class() error case. cl->qdisc and cl should only be freed if a new class and qdisc were allocated, or we risk various UAF.

  • CVE-2025-71120Jan 14, 2026
    affected < 5.14.21-150400.24.194.1.150400.24.98.3fixed 5.14.21-150400.24.194.1.150400.24.98.3

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf A zero length gss_token results in pages == 0 and in_token->pages[0] is NULL. The code unconditionally evaluates page_addres

  • CVE-2025-71116Jan 14, 2026
    affected < 5.14.21-150400.24.194.1.150400.24.98.3fixed 5.14.21-150400.24.194.1.150400.24.98.3

    In the Linux kernel, the following vulnerability has been resolved: libceph: make decode_pool() more resilient against corrupted osdmaps If the osdmap is (maliciously) corrupted such that the encoded length of ceph_pg_pool envelope is less than what is expected for a particular

  • CVE-2025-71112Jan 14, 2026
    affected < 5.14.21-150400.24.194.1.150400.24.98.3fixed 5.14.21-150400.24.194.1.150400.24.98.3

    In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validation before using Currently, the VLAN id may be used without validation when receive a VLAN configuration mailbox from VF. The length of vlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_V

  • CVE-2025-71089HigJan 13, 2026
    affected < 5.14.21-150400.24.194.1.150400.24.98.3fixed 5.14.21-150400.24.194.1.150400.24.98.3

    In the Linux kernel, the following vulnerability has been resolved: iommu: disable SVA when CONFIG_X86 is set Patch series "Fix stale IOTLB entries for kernel address space", v7. This proposes a fix for a security vulnerability related to IOMMU Shared Virtual Addressing (SVA).

Page 1 of 142