VYPR

rpm package

suse/kernel-ec2&distro=SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE

pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE

Vulnerabilities (253)

  • CVE-2026-23191HigFeb 14, 2026
    affected < 3.0.101-108.204.1fixed 3.0.101-108.204.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access at PCM trigger The PCM trigger callback of aloop driver tries to check the PCM state and stop the stream of the tied substream in the corresponding cable. Since both check and stop

  • CVE-2026-23074HigFeb 4, 2026
    affected < 3.0.101-108.204.1fixed 3.0.101-108.204.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: Enforce that teql can only be used as root qdisc Design intent of teql is that it is only supposed to be used as root qdisc. We need to check for that constraint. Although not important, I will desc

  • CVE-2026-23089Feb 4, 2026
    affected < 3.0.101-108.204.1fixed 3.0.101-108.204.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() When snd_usb_create_mixer() fails, snd_usb_mixer_free() frees mixer->id_elems but the controls already added to the card still reference the freed mem

  • CVE-2023-54168Dec 30, 2025
    affected < 3.0.101-108.198.1fixed 3.0.101-108.198.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() The ucmd->log_sq_bb_count variable is controlled by the user so this shift can wrap. Fix it by using check_shl_overflow() in the same way that it was don

  • CVE-2023-54110Dec 24, 2025
    affected < 3.0.101-108.198.1fixed 3.0.101-108.198.1

    In the Linux kernel, the following vulnerability has been resolved: usb: rndis_host: Secure rndis_query check against int overflow Variables off and len typed as uint32 in rndis_query function are controlled by incoming RNDIS response message thus their value may be manipulated

  • CVE-2025-40215Dec 4, 2025
    affected < 3.0.101-108.198.1fixed 3.0.101-108.198.1

    In the Linux kernel, the following vulnerability has been resolved: xfrm: delete x->tunnel as we delete x The ipcomp fallback tunnels currently get deleted (from the various lists and hashtables) as the last user state that needed that fallback is destroyed (not deleted). If a

  • CVE-2025-40018Oct 24, 2025
    affected < 3.0.101-108.198.1fixed 3.0.101-108.198.1

    In the Linux kernel, the following vulnerability has been resolved: ipvs: Defer ip_vs_ftp unregister during netns cleanup On the netns cleanup path, __ip_vs_ftp_exit() may unregister ip_vs_ftp before connections with valid cp->app pointers are flushed, leading to a use-after-fr

  • CVE-2023-53722Oct 22, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: md: raid1: fix potential OOB in raid1_remove_disk() If rddev->raid_disk is greater than mddev->raid_disks, there will be an out-of-bounds in raid1_remove_disk(). We have already found similar reports as follows

  • CVE-2023-53705Oct 22, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix out-of-bounds access in ipv6_find_tlv() optlen is fetched without checking whether there is more than one byte to parse. It can lead to out-of-bounds access. Found by InfoTeCS on behalf of Linux Veri

  • CVE-2025-39973Oct 15, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: i40e: add validation for ring_len param The `ring_len` parameter provided by the virtual function (VF) is assigned directly to the hardware memory context (HMC) without any validation. To address this, introdu

  • CVE-2023-53676Oct 7, 2025
    affected < 3.0.101-108.195.1fixed 3.0.101-108.195.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() The function lio_target_nacl_info_show() uses sprintf() in a loop to print details for every iSCSI connection in a session without checkin

  • CVE-2022-50409Sep 18, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory Fixes the below NULL pointer dereference: [...] [ 14.471200] Call Trace: [ 14.471562] [ 14.471882] lock_acquire+0x

  • CVE-2023-53395Sep 18, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer ACPICA commit 90310989a0790032f5a0140741ff09b545af4bc5 According to the ACPI specification 19.6.134, no argument is required to be passed for ASL Timer instruct

  • CVE-2022-50381Sep 18, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: md: fix a crash in mempool_free There's a crash in mempool_free when running the lvm test shell/lvchange-rebuild-raid.sh. The reason for the crash is this: * super_written calls atomic_dec_and_test(&mddev->pen

  • CVE-2023-53365Sep 17, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: ip6mr: Fix skb_under_panic in ip6mr_cache_report() skbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4 head:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg ------------[ cut he

  • CVE-2023-53322Sep 16, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Wait for io return on terminate rport System crash due to use after free. Current code allows terminate_rport_io to exit before making sure all IOs has returned. For FCP-2 device, IO's can hang o

  • CVE-2023-53282Sep 16, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write During the sysfs firmware write process, a use-after-free read warning is logged from the lpfc_wr_object() routine: BUG: KFENCE: us

  • CVE-2022-50272Sep 15, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() Wei Chen reports a kernel bug as blew: general protection fault, probably for non-canonical address KASAN: null-ptr-deref in range [0x00000000000

  • CVE-2023-53147Sep 15, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: xfrm: add NULL check in xfrm_update_ae_params Normally, x->replay_esn and x->preplay_esn should be allocated at xfrm_alloc_replay_state_esn(...) in xfrm_state_construct(...), hence the xfrm_update_ae_params(...

  • CVE-2022-50252Sep 15, 2025
    affected < 3.0.101-108.192.1fixed 3.0.101-108.192.1

    In the Linux kernel, the following vulnerability has been resolved: igb: Do not free q_vector unless new one was allocated Avoid potential use-after-free condition under memory pressure. If the kzalloc() fails, q_vector will be freed but left in the original adapter->q_vector[v

Page 1 of 13