VYPR

rpm package

suse/kernel-docs&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP3

pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3

Vulnerabilities (1,468)

  • CVE-2022-49789May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: zfcp: Fix double free of FSF request when qdio send fails We used to use the wrong type of integer in 'zfcp_fsf_req_send()' to cache the FSF request ID when sending a new FSF request. This is used in case

  • CVE-2022-49788May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() `struct vmci_event_qp` allocated by qp_notify_peer() contains padding, which may carry uninitialized data to the userspace, as observed by KMSAN

  • CVE-2022-49787May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() pci_get_device() will increase the reference count for the returned pci_dev. We need to use pci_dev_put() to decrease the reference count

  • CVE-2022-49777May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: Input: i8042 - fix leaking of platform device on module removal Avoid resetting the module-wide i8042_platform_device pointer in i8042_probe() or i8042_remove(), so that the device can be properly destroyed by

  • CVE-2022-49775May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: tcp: cdg: allow tcp_cdg_release() to be called multiple times Apparently, mptcp is able to call tcp_disconnect() on an already disconnected flow. This is generally fine, unless current congestion control is CDG

  • CVE-2022-49772May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() snd_usbmidi_output_open() has a check of the NULL port with snd_BUG_ON(). snd_BUG_ON() was used as this shouldn't have happened, but in reality

  • CVE-2022-49771May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: dm ioctl: fix misbehavior if list_versions races with module loading __list_versions will first estimate the required space using the "dm_target_iterate(list_version_get_needed, &needed)" call and then will fil

  • CVE-2022-49770May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: ceph: avoid putting the realm twice when decoding snaps fails When decoding the snaps fails it maybe leaving the 'first_realm' and 'realm' pointing to the same snaprealm memory. And then it'll put it twice and

  • CVE-2022-49769May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: gfs2: Check sb_bsize_shift after reading superblock Fuzzers like to scribble over sb_bsize_shift but in reality it's very unlikely that this field would be corrupted on its own. Nevertheless it should be checke

  • CVE-2022-49767May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: 9p/trans_fd: always use O_NONBLOCK read/write syzbot is reporting hung task at p9_fd_close() [1], for p9_mux_poll_stop() from p9_conn_destroy() from p9_fd_close() is failing to interrupt already started kernel

  • CVE-2020-36790May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: nvmet: fix a memory leak We forgot to free new_model_number

  • CVE-2025-37789May 1, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first.

  • CVE-2025-37752May 1, 2025
    affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1

    In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the c

  • CVE-2025-40364Apr 18, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: io_uring: fix io_req_prep_async with provided buffers io_req_prep_async() can import provided buffers, commit the ring state by giving up on that before, it'll be reimported later if needed.

  • CVE-2021-47670Apr 17, 2025
    affected < 5.3.18-150300.59.204.1fixed 5.3.18-150300.59.204.1

    In the Linux kernel, the following vulnerability has been resolved: can: peak_usb: fix use after free bugs After calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is accessed after the peak_usb_netif_rx_ni().

  • CVE-2021-47669Apr 17, 2025
    affected < 5.3.18-150300.59.204.1fixed 5.3.18-150300.59.204.1

    In the Linux kernel, the following vulnerability has been resolved: can: vxcan: vxcan_xmit: fix use after free bug After calling netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the canfd_frame cfd which aliases skb memory is accessed after the netif_rx_ni().

  • CVE-2021-47668Apr 17, 2025
    affected < 5.3.18-150300.59.204.1fixed 5.3.18-150300.59.204.1

    In the Linux kernel, the following vulnerability has been resolved: can: dev: can_restart: fix use after free bug After calling netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is accessed after the netif_rx_ni() in: sta

  • CVE-2020-36789Apr 17, 2025
    affected < 5.3.18-150300.59.204.1fixed 5.3.18-150300.59.204.1

    In the Linux kernel, the following vulnerability has been resolved: can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context If a driver calls can_get_echo_skb() during a hardware IRQ (which is often, but not always, the case), the 'WARN_ON(in_irq)' in net/

  • CVE-2025-22121Apr 16, 2025
    affected < 5.3.18-150300.59.207.1fixed 5.3.18-150300.59.207.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() There's issue as follows: BUG: KASAN: use-after-free in ext4_xattr_inode_dec_ref_all+0x6ff/0x790 Read of size 4 at addr ffff88807b003000 by task syz

  • CVE-2025-22055Apr 16, 2025
    affected < 5.3.18-150300.59.204.1fixed 5.3.18-150300.59.204.1

    In the Linux kernel, the following vulnerability has been resolved: net: fix geneve_opt length integer overflow struct geneve_opt uses 5 bit length for each single option, which means every vary size option should be smaller than 128 bytes. However, all current related Netlink

Page 15 of 74