VYPR

rpm package

suse/kernel-rt&distro=SUSE Real Time Module 15 SP7

pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7

Vulnerabilities (2,100)

  • CVE-2025-21853Mar 12, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: avoid holding freeze_mutex during mmap operation We use map->freeze_mutex to prevent races between map_freeze() and memory mapping BPF map contents with writable permissions. The way we naively do this mea

  • CVE-2025-21852Mar 12, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: net: Add rx_skb of kfree_skb to raw_tp_null_args[]. Yan Zhai reported a BPF prog could trigger a null-ptr-deref [0] in trace_kfree_skb if the prog does not check if rx_sk is NULL. Commit c53795d48ee8 ("net: ad

  • CVE-2025-21849Mar 12, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: Use spin_lock_irqsave() in interruptible context spin_lock/unlock() functions used in interrupt contexts could result in a deadlock, as seen in GitLab issue #13399, which occurs when interrupt come

  • CVE-2025-21842Mar 7, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: amdkfd: properly free gang_ctx_bo when failed to init user queue The destructor of a gtt bo is declared as void amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj); Which takes void** as the

  • CVE-2025-21839Mar 7, 2025
    affected < 6.4.0-150700.7.13.1fixed 6.4.0-150700.7.13.1

    In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop Move the conditional loading of hardware DR6 with the guest's DR6 value out of the core .vcpu_run() loop to fix a bug where KVM can load

  • CVE-2024-58077Mar 6, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback commit 1f5664351410 ("ASoC: lower "no backend DAIs enabled for ... Port" log severity") ignores -EINVAL error message on common soc_pcm_ret(). It is u

  • CVE-2024-58070Mar 6, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT In PREEMPT_RT, kmalloc(GFP_ATOMIC) is still not safe in non preemptible context. bpf_mem_alloc must be used in PREEMPT_RT. This patch is to enforce

  • CVE-2024-58062Mar 6, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: avoid NULL pointer dereference When iterating over the links of a vif, we need to make sure that the pointer is valid (in other words - that the link exists) before dereferncing it. Use for_

  • CVE-2024-58053Mar 6, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix handling of received connection abort Fix the handling of a connection abort that we've received. Though the abort is at the connection level, it needs propagating to the calls on that connection.

  • CVE-2025-21814MedFeb 27, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: ptp: Ensure info->enable callback is always set The ioctl and sysfs handlers unconditionally call the ->enable callback. Not all drivers implement that callback, leading to NULL dereferences. Example of affecte

  • CVE-2025-21824Feb 27, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: gpu: host1x: Fix a use of uninitialized mutex commit c8347f915e67 ("gpu: host1x: Fix boot regression for Tegra") caused a use of uninitialized mutex leading to below warning when CONFIG_DEBUG_MUTEXES and CONFIG

  • CVE-2025-21805Feb 27, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/rtrs: Add missing deinit() call A warning is triggered when repeatedly connecting and disconnecting the rnbd: list_add corruption. prev->next should be next (ffff88800b13e480), but was ffff88801ecd1338. (

  • CVE-2025-21787MedFeb 27, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: team: better TEAM_OPTION_TYPE_STRING validation syzbot reported following splat [1] Make sure user-provided data contains one nul byte. [1] BUG: KMSAN: uninit-value in string_nocheck lib/vsprintf.c:633 [inli

  • CVE-2025-21758MedFeb 27, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocation

  • CVE-2025-21792Feb 27, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt If an AX25 device is bound to a socket by setting the SO_BINDTODEVICE socket option, a refcount leak will occur in ax25_release(). Commit 9fd75

  • CVE-2025-21770Feb 27, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: iommu: Fix potential memory leak in iopf_queue_remove_device() The iopf_queue_remove_device() helper removes a device from the per-iommu iopf queue when PRI is disabled on the device. It responds to all outstan

  • CVE-2025-21768Feb 27, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels Some lwtunnels have a dst cache for post-transformation dst. If the packet destination did not change we may end up recording a reference to the lwt

  • CVE-2024-54458Feb 27, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: bsg: Set bsg_queue to NULL after removal Currently, this does not cause any issues, but I believe it is necessary to set bsg_queue to NULL after removing it to prevent potential use-after-free (UAF)

  • CVE-2024-58015Feb 27, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible ou

  • CVE-2024-58004Feb 27, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: media: intel/ipu6: remove cpu latency qos request on error Fix cpu latency qos list corruption like below. It happens when we do not remove cpu latency request on error path and free corresponding memory. [

Page 102 of 105