VYPR

rpm package

suse/kernel-docs&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP3

pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3

Vulnerabilities (1,468)

  • CVE-2025-38477MedJul 28, 2025
    affected < 5.3.18-150300.59.218.1fixed 5.3.18-150300.59.218.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, q

  • CVE-2025-38468MedJul 28, 2025
    affected < 5.3.18-150300.59.218.1fixed 5.3.18-150300.59.218.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree htb_lookup_leaf has a BUG_ON that can trigger with the following: tc qdisc del dev lo root tc qdisc add dev lo root handle 1: htb default

  • CVE-2025-38488Jul 28, 2025
    affected < 5.3.18-150300.59.221.1fixed 5.3.18-150300.59.221.1

    In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free in crypt_message when using async crypto The CVE-2024-50047 fix removed asynchronous crypto handling from crypt_message(), assuming all crypto operations are synchronous. However

  • CVE-2025-38476Jul 28, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: rpl: Fix use-after-free in rpl_do_srh_inline(). Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers the splat below [0]. rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after skb_cow_he

  • CVE-2025-38460Jul 25, 2025
    affected < 5.3.18-150300.59.218.1fixed 5.3.18-150300.59.218.1

    In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix potential null-ptr-deref in to_atmarpd(). atmarpd is protected by RTNL since commit f3a0592b37b8 ("[ATM]: clip causes unregister hang"). However, it is not enough because to_atmarpd() is called

  • CVE-2025-38352KEVJul 22, 2025
    affected < 5.3.18-150300.59.218.1fixed 5.3.18-150300.59.218.1

    In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be

  • CVE-2025-38350HigJul 19, 2025
    affected < 5.3.18-150300.59.218.1fixed 5.3.18-150300.59.218.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain classful qdiscs may invoke their classes' dequeue handler on an enqueue operation. This may unexpectedly empty the child qdisc and thu

  • CVE-2025-38323Jul 10, 2025
    affected < 5.3.18-150300.59.218.1fixed 5.3.18-150300.59.218.1

    In the Linux kernel, the following vulnerability has been resolved: net: atm: add lec_mutex syzbot found its way in net/atm/lec.c, and found an error path in lecd_attach() could leave a dangling pointer in dev_lec[]. Add a mutex to protect dev_lecp[] uses from lecd_attach(), l

  • CVE-2025-38216Jul 4, 2025
    affected < 5.3.18-150300.59.221.1fixed 5.3.18-150300.59.221.1

    In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Restore context entry setup order for aliased devices Commit 2031c469f816 ("iommu/vt-d: Add support for static identity domain") changed the context entry setup during domain attachment from a set-a

  • CVE-2025-38206Jul 4, 2025
    affected < 5.3.18-150300.59.218.1fixed 5.3.18-150300.59.218.1

    In the Linux kernel, the following vulnerability has been resolved: exfat: fix double free in delayed_free The double free could happen in the following path. exfat_create_upcase_table() exfat_create_upcase_table() : return error exfat_free_upcase_table() : fre

  • CVE-2025-38184Jul 4, 2025
    affected < 5.3.18-150300.59.221.1fixed 5.3.18-150300.59.221.1

    In the Linux kernel, the following vulnerability has been resolved: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer The reproduction steps: 1. create a tun interface 2. enable l2 bearer 3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun tipc: Started i

  • CVE-2025-38180Jul 4, 2025
    affected < 5.3.18-150300.59.218.1fixed 5.3.18-150300.59.218.1

    In the Linux kernel, the following vulnerability has been resolved: net: atm: fix /proc/net/atm/lec handling /proc/net/atm/lec must ensure safety against dev_lec[] changes. It appears it had dev_put() calls without prior dev_hold(), leading to imbalance and UAF.

  • CVE-2025-38083MedJun 20, 2025
    affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1

    In the Linux kernel, the following vulnerability has been resolved: net_sched: prio: fix a race in prio_tune() Gerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer fires at the wrong time. The race is as follows: CPU 0 CPU

  • CVE-2022-50231Jun 18, 2025
    affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: arm64/poly1305 - fix a read out-of-bound A kasan error was reported during fuzzing: BUG: KASAN: slab-out-of-bounds in neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon] Read of size 4 at addr

  • CVE-2022-50229Jun 18, 2025
    affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: bcd2000: Fix a UAF bug on the error path of probing When the driver fails in snd_card_register() at probe time, it will free the 'bcd2k->midi_out_urb' before killing it, which may cause a UAF bug. The fo

  • CVE-2022-50222Jun 18, 2025
    affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1

    In the Linux kernel, the following vulnerability has been resolved: tty: vt: initialize unicode screen buffer syzbot reports kernel infoleak at vcs_read() [1], for buffer can be read immediately after resize operation. Initialize buffer using kzalloc(). ---------- #include

  • CVE-2022-50220Jun 18, 2025
    affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1

    In the Linux kernel, the following vulnerability has been resolved: usbnet: Fix linkwatch use-after-free on disconnect usbnet uses the work usbnet_deferred_kevent() to perform tasks which may sleep. On disconnect, completion of the work was originally awaited in ->ndo_stop().

  • CVE-2022-50218Jun 18, 2025
    affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1

    In the Linux kernel, the following vulnerability has been resolved: iio: light: isl29028: Fix the warning in isl29028_remove() The driver use the non-managed form of the register function in isl29028_remove(). To keep the release order as mirroring the ordering in probe, the dr

  • CVE-2022-50215Jun 18, 2025
    affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Allow waiting for commands to complete on removed device When a SCSI device is removed while in active use, currently sg will immediately return -ENODEV on any attempt to wait for active commands that

  • CVE-2022-50213Jun 18, 2025
    affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not allow SET_ID to refer to another table When doing lookups for sets on the same batch by using its ID, a set from a different table can be used. Then, when the table is removed, a r

Page 7 of 74