VYPR

rpm package

suse/kernel-obs-build&distro=SUSE Linux Enterprise Module for Development Tools 15 SP7

pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP7

Vulnerabilities (2,262)

  • CVE-2025-71141Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: drm/tilcdc: Fix removal actions in case of failed probe The drm_kms_helper_poll_fini() and drm_atomic_helper_shutdown() helpers should only be called when the device has been successfully registered. Currently,

  • CVE-2025-71138Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add missing NULL pointer check for pingpong interface It is checked almost always in dpu_encoder_phys_wb_setup_ctl(), but in a single place the check is missing. Also use convenient locals instead

  • CVE-2025-71137Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" This patch ensures that the RX ring size (rx_pending) is not set below the permitted length. This avoids UBSAN shift-out-of-bounds errors when users passes s

  • CVE-2025-71136Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status() It's possible for cp_read() and hdmi_read() to return -EIO. Those values are further used as indexes for accessing arrays.

  • CVE-2025-71135Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() The variable mddev->private is first assigned to conf and then checked: conf = mddev->private; if (!conf) ... If conf is

  • CVE-2025-71133Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: avoid invalid read in irdma_net_event irdma_net_event() should not dereference anything from "neigh" (alias "ptr") until it has checked that the event is NETEVENT_NEIGH_UPDATE. Other events come wit

  • CVE-2025-71132Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: smc91x: fix broken irq-context in PREEMPT_RT When smc91x.c is built with PREEMPT_RT, the following splat occurs in FVP_RevC: [ 13.055000] smc91x LNRO0003:00 eth0: link up, 10Mbps, half-duplex, lpa 0x0000 [

  • CVE-2025-71131Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Do not use req->iv after crypto_aead_encrypt As soon as crypto_aead_encrypt is called, the underlying request may be freed by an asynchronous completion. Thus dereferencing req->iv after it ret

  • CVE-2025-71130Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer Initialize the eb.vma array with values of 0 when the eb structure is first set up. In particular, this sets the eb->vma[i].vma pointers

  • CVE-2025-71126Jan 14, 2026
    affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1

    In the Linux kernel, the following vulnerability has been resolved: mptcp: avoid deadlock on fallback while reinjecting Jakub reported an MPTCP deadlock at fallback time: WARNING: possible recursive locking detected 6.18.0-rc7-virtme #1 Not tainted -------------------------

  • CVE-2025-71125Jan 14, 2026
    affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1

    In the Linux kernel, the following vulnerability has been resolved: tracing: Do not register unsupported perf events Synthetic events currently do not have a function to register perf events. This leads to calling the tracepoint register functions with a NULL function pointer w

  • CVE-2025-71123Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix string copying in parse_apply_sb_mount_options() strscpy_pad() can't be used to copy a non-NUL-term string into a NUL-term string of possibly bigger size. Commit 0efc5990bca5 ("string.h: Introduce me

  • CVE-2025-71120Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf A zero length gss_token results in pages == 0 and in_token->pages[0] is NULL. The code unconditionally evaluates page_addres

  • CVE-2025-71119Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: powerpc/kexec: Enable SMT before waking offline CPUs If SMT is disabled or a partial SMT state is enabled, when a new kernel image is loaded for kexec, on reboot the following warning is observed: kexec: Wakin

  • CVE-2025-71118Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: ACPICA: Avoid walking the Namespace if start_node is NULL Although commit 0c9992315e73 ("ACPICA: Avoid walking the ACPI Namespace if it is not there") fixed the situation when both start_node and acpi_gbl_root_

  • CVE-2025-71116Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: libceph: make decode_pool() more resilient against corrupted osdmaps If the osdmap is (maliciously) corrupted such that the encoded length of ceph_pg_pool envelope is less than what is expected for a particular

  • CVE-2025-71114Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: via_wdt: fix critical boot hang due to unnamed resource allocation The VIA watchdog driver uses allocate_resource() to reserve a MMIO region for the watchdog control register. However, the allocated resource wa

  • CVE-2025-71113Jan 14, 2026
    affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - zero initialize memory allocated via sock_kmalloc Several crypto user API contexts and requests allocated with sock_kmalloc() were left uninitialized, relying on callers to set fields explicitl

  • CVE-2025-71112Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validation before using Currently, the VLAN id may be used without validation when receive a VLAN configuration mailbox from VF. The length of vlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_V

  • CVE-2025-71111Jan 14, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Convert macros to functions to avoid TOCTOU The macro FAN_FROM_REG evaluates its arguments multiple times. When used in lockless contexts involving shared driver data, this leads to Time-of-Che

Page 9 of 114