VYPR

rpm package

suse/kernel-livepatch-SLE15-SP7-RT_Update_9&distro=SUSE Linux Enterprise Live Patching 15 SP7

pkg:rpm/suse/kernel-livepatch-SLE15-SP7-RT_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP7

Vulnerabilities (174)

  • CVE-2025-40259Dec 4, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may sleep. Hence, call sg_finish_rem_req() with interrupts enabled instead of disabled.

  • CVE-2025-40257Dec 4, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: mptcp: fix a race in mptcp_pm_del_add_timer() mptcp_pm_del_add_timer() can call sk_stop_timer_sync(sk, &entry->add_timer) while another might have free entry already, as reported by syzbot. Add RCU protection

  • CVE-2025-40254Dec 4, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: remove never-working support for setting nsh fields The validation of the set(nsh(...)) action is completely wrong. It runs through the nsh_key_put_from_nlattr() function that is the same func

  • CVE-2025-40238Dec 4, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix IPsec cleanup over MPV device When we do mlx5e_detach_netdev() we eventually disable blocking events notifier, among those events are IPsec MPV events from IB to core. So before disabling those b

  • CVE-2025-40202Nov 12, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: ipmi: Rework user message limit handling The limit on the number of user messages had a number of issues, improper counting in some cases and a use after free. Restructure how this is all done to handle more i

  • CVE-2025-40181Nov 12, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP When running as an SNP or TDX guest under KVM, force the legacy PCI hole, i.e. memory between Top of Lower Usable DRAM and 4GiB, to be mapp

  • CVE-2025-40177Nov 12, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Fix bootlog initialization ordering As soon as we queue MHI buffers to receive the bootlog from the device, we could be receiving data. Therefore all the resources needed to process that data need t

  • CVE-2025-40166Nov 12, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc: Check GuC running state before deregistering exec queue In normal operation, a registered exec queue is disabled and deregistered through the GuC, and freed only after the GuC confirms completion. H

  • CVE-2025-40142Nov 12, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT snd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts via spin_lock_irq(). This also implicitly disables the handling

  • CVE-2025-40136Nov 12, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - request reserved interrupt for virtual function The device interrupt vector 3 is an error interrupt for physical function and a reserved interrupt for virtual function. However, the drive

  • CVE-2025-40132Nov 12, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback In create_sdw_dailink() check that sof_end->codec_info->add_sidecar is not NULL before calling it. The original code assumed that if include_side

  • CVE-2025-40106Oct 31, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: comedi: fix divide-by-zero in comedi_buf_munge() The comedi_buf_munge() function performs a modulo operation `async->munge_chan %= async->cmd.chanlist_len` without first checking if chanlist_len is zero. If a u

  • CVE-2025-40097Oct 30, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: Fix missing pointer check in hda_component_manager_init function The __component_match_add function may assign the 'matchptr' pointer the value ERR_PTR(-ENOMEM), which will subsequently be dereferenc

  • CVE-2023-53714Oct 22, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: drm/stm: ltdc: fix late dereference check In ltdc_crtc_set_crc_source(), struct drm_crtc was dereferenced in a container_of() before the pointer check. This could cause a kernel panic. Fix this smatch warning:

  • CVE-2025-39913Oct 1, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. syzbot reported the splat below. [0] The repro does the following: 1. Load a sk_msg prog that calls bpf_msg_cork_bytes(

  • CVE-2025-39880Sep 23, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: libceph: fix invalid accesses to ceph_connection_v1_info There is a place where generic code in messenger.c is reading and another place where it is writing to con->v1 union member without checking that the uni

  • CVE-2025-39813MedSep 16, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix potential warning in trace_printk_seq during ftrace_dump When calling ftrace_dump_one() concurrently with reading trace_pipe, a WARN_ON_ONCE() in trace_printk_seq() can be triggered due to a race co

  • CVE-2025-39836Sep 16, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: efi: stmm: Fix incorrect buffer allocation method The communication buffer allocated by setup_mm_hdr() is later on passed to tee_shm_register_kernel_buf(). The latter expects those buffers to be contiguous page

  • CVE-2025-39829Sep 16, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: trace/fgraph: Fix the warning caused by missing unregister notifier This warning was triggered during testing on v6.16: notifier callback ftrace_suspend_notifier_call already registered WARNING: CPU: 2 PID: 86

  • CVE-2025-39689HigSep 5, 2025
    affected < 1-150700.1.3.2fixed 1-150700.1.3.2

    In the Linux kernel, the following vulnerability has been resolved: ftrace: Also allocate and copy hash for reading of filter files Currently the reader of set_ftrace_filter and set_ftrace_notrace just adds the pointer to the global tracer hash to its iterator. Unlike the write

Page 8 of 9