VYPR

rpm package

suse/kernel-obs-build&distro=SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS

pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS

Vulnerabilities (2,310)

  • CVE-2022-50838Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: net: stream: purge sk_error_queue in sk_stream_kill_queues() Changheon Lee reported TCP socket leaks, with a nice repro. It seems we leak TCP sockets with the following sequence: 1) SOF_TIMESTAMPING_TX_ACK is

  • CVE-2022-50836Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: remoteproc: sysmon: fix memory leak in qcom_add_sysmon_subdev() The kfree() should be called when of_irq_get_byname() fails or devm_request_threaded_irq() fails in qcom_add_sysmon_subdev(), otherwise there will

  • CVE-2022-50835Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: jbd2: add miss release buffer head in fc_do_one_pass() In fc_do_one_pass() miss release buffer head after use which will lead to reference count leak.

  • CVE-2022-50834Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: nfc: Fix potential resource leaks nfc_get_device() take reference for the device, add missing nfc_put_device() to release it when not need anymore. Also fix the style warnning by use error EOPNOTSUPP instead of

  • CVE-2022-50833Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: use hdev->workqueue when queuing hdev->{cmd,ncmd}_timer works syzbot is reporting attempt to schedule hdev->cmd_work work from system_wq WQ into hdev->workqueue WQ which is under draining operation [

  • CVE-2022-50832Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() The wilc_mac_xmit() returns NETDEV_TX_OK without freeing skb, add dev_kfree_skb() to fix it. Compile tested only.

  • CVE-2022-50830Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() hd44780_probe() allocates a memory chunk for hd with kzalloc() and makes "lcd->drvdata->hd44780" point to it. When we call hd44780_remove(), we

  • CVE-2022-50829Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb() It is possible that skb is freed in ath9k_htc_rx_msg(), then usb_submit_urb() fails and we try to free skb again. It causes use-after-free b

  • CVE-2022-50828Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: clk: zynqmp: Fix stack-out-of-bounds in strncpy` "BUG: KASAN: stack-out-of-bounds in strncpy+0x30/0x68" Linux-ATF interface is using 16 bytes of SMC payload. In case clock name is longer than 15 bytes, string

  • CVE-2022-50827Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix memory leak in lpfc_create_port() Commit 5e633302ace1 ("scsi: lpfc: vmid: Add support for VMID in mailbox command") introduced allocations for the VMID resources in lpfc_create_port() after the

  • CVE-2022-50826Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: ipu3-imgu: Fix NULL pointer dereference in imgu_subdev_set_selection() Calling v4l2_subdev_get_try_crop() and v4l2_subdev_get_try_compose() with a subdev state of NULL leads to a NULL pointer dereference. This

  • CVE-2022-50824Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak In check_acpi_tpm2(), we get the TPM2 table just to make sure the table is there, not used after the init, so the acpi_put_table() should be adde

  • CVE-2022-50823Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: clk: tegra: Fix refcount leak in tegra114_clock_init of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put()

  • CVE-2022-50822Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/restrack: Release MR restrack when delete The MR restrack also needs to be released when delete it, otherwise it cause memory leak as the task struct won't be released.

  • CVE-2022-50821Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails

  • CVE-2022-50819Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: udmabuf: Set ubuf->sg = NULL if the creation of sg table fails When userspace tries to map the dmabuf and if for some reason (e.g. OOM) the creation of the sg table fails, ubuf->sg needs to be set to NULL. Othe

  • CVE-2022-50818Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix running_req for internal abort commands Disabling the remote phy for a SATA disk causes a hang: root@(none)$ more /sys/class/sas_phy/phy-0:0:8/target_port_protocols sata root@(none)$ echo 0 >

  • CVE-2022-50814Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr KASAN reported this Bug: [17619.659757] BUG: KASAN: global-out-of-bounds in param_get_int+0x34/0x60 [17619.673193] Read of size 4 at addr fffff01332

  • CVE-2022-50809Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: xhci: dbc: Fix memory leak in xhci_alloc_dbc() If DbC is already in use, then the allocated memory for the xhci_dbc struct doesn't get freed before returning NULL, which leads to a memleak.

  • CVE-2023-54321Dec 30, 2025
    affected < 5.14.21-150500.55.133.1fixed 5.14.21-150500.55.133.1

    In the Linux kernel, the following vulnerability has been resolved: driver core: fix potential null-ptr-deref in device_add() I got the following null-ptr-deref report while doing fault injection test: BUG: kernel NULL pointer dereference, address: 0000000000000058 CPU: 2 PID:

Page 8 of 116