VYPR

rpm package

suse/kernel-livepatch-SLE15-SP7-RT_Update_2&distro=SUSE Linux Enterprise Live Patching 15 SP7

pkg:rpm/suse/kernel-livepatch-SLE15-SP7-RT_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP7

Vulnerabilities (286)

  • CVE-2025-38072Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: libnvdimm/labels: Fix divide error in nd_label_data_init() If a faulty CXL memory device returns a broken zero LSA size in its memory device information (Identify Memory Device (Opcode 4000h), CXL spec. 3.1, 8.

  • CVE-2025-38068Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: lzo - Fix compression buffer overrun Unlike the decompression code, the compression code in LZO never checked for output overruns. It instead assumes that the caller always provides enough buffer space

  • CVE-2025-38065Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: orangefs: Do not truncate file size 'len' is used to store the result of i_size_read(), so making 'len' a size_t results in truncation to 4GiB on 32-bit systems.

  • CVE-2025-38060Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: copy_verifier_state() should copy 'loop_entry' field The bpf_verifier_state.loop_entry state should be copied by copy_verifier_state(). Otherwise, .loop_entry values from unrelated states would poison env-

  • CVE-2025-38059Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: avoid NULL pointer dereference if no valid csum tree [BUG] When trying read-only scrub on a btrfs with rescue=idatacsums mount option, it will crash with the following call trace: BUG: kernel NULL poi

  • CVE-2025-38057Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: espintcp: fix skb leaks A few error paths are missing a kfree_skb.

  • CVE-2025-38055Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Fix segfault with PEBS-via-PT with sample_freq Currently, using PEBS-via-PT with a sample frequency instead of a sample period, causes a segfault. For example: BUG: kernel NULL pointer der

  • CVE-2025-38053Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: idpf: fix null-ptr-deref in idpf_features_check idpf_features_check is used to validate the TX packet. skb header length is compared with the hardware supported value received from the device control plane. The

  • CVE-2025-38045Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix debug actions order The order of actions taken for debug was implemented incorrectly. Now we implemented the dump split and do the FW reset only in the middle of the dump (rather than the FW

  • CVE-2025-38044Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: media: cx231xx: set device_caps for 417 The video_device for the MPEG encoder did not set device_caps. Add this, otherwise the video device can't be registered (you get a WARN_ON instead). Not seen before sin

  • CVE-2025-38043Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: firmware: arm_ffa: Set dma_mask for ffa devices Set dma_mask for FFA devices, otherwise DMA allocation using the device pointer lead to following warning: WARNING: CPU: 1 PID: 1 at kernel/dma/mapping.c:597 dma

  • CVE-2025-38040Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: serial: mctrl_gpio: split disable_ms into sync and no_sync APIs The following splat has been observed on a SAMA5D27 platform using atmel_serial: BUG: sleeping function called from invalid context at kernel/irq

  • CVE-2025-38031Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: padata: do not leak refcount in reorder_work A recent patch that addressed a UAF introduced a reference count leak: the parallel_data refcount is incremented unconditionally, regardless of the return value of q

  • CVE-2025-38027Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: regulator: max20086: fix invalid memory access max20086_parse_regulators_dt() calls of_regulator_match() using an array of struct of_regulator_match allocated on the stack for the matches argument. of_regulato

  • CVE-2025-38024Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x7d/0xa0 lib/dump_stack.c:120 print_address_description mm/kasan/

  • CVE-2025-38023Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: nfs: handle failure of nfs_get_lock_context in unlock path When memory is insufficient, the allocation of nfs_lock_context in nfs_get_lock_context() fails and returns -ENOMEM. If we mistakenly treat an nfs4_unl

  • CVE-2025-38022Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description

  • CVE-2025-38020Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Disable MACsec offload for uplink representor profile MACsec offload is not supported in switchdev mode for uplink representors. When switching to the uplink representor profile, the MACsec offload f

  • CVE-2025-38018Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: net/tls: fix kernel panic when alloc_page failed We cannot set frag_list to NULL pointer when alloc_page failed. It will be used in tls_strp_check_queue_ok when the next time tls_strp_read_sock is called. This

  • CVE-2025-38015Jun 18, 2025
    affected < 1-150700.1.5.1fixed 1-150700.1.5.1

    In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix memory leak in error handling path of idxd_alloc Memory allocated for idxd is not freed if an error occurs during idxd_alloc(). To fix it, free the allocated memory in the reverse order of

Page 3 of 15