VYPR

rpm package

suse/kernel-source&distro=SUSE Linux Enterprise Server 15 SP4-LTSS

pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS

Vulnerabilities (2,830)

  • CVE-2021-47644Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: media: staging: media: zoran: move videodev alloc Move some code out of zr36057_init() and create new functions for handling zr->video_dev. This permit to ease code reading and fix a zr->video_dev memory leak.

  • CVE-2021-47643Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: media: ir_toy: free before error exiting Fix leak in error path.

  • CVE-2021-47642Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow Coverity complains of a possible buffer overflow. However, given the 'static' scope of nvidia_setup_i2c_bus() it looks like that can't happen aft

  • CVE-2021-47641Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: video: fbdev: cirrusfb: check pixclock to avoid divide by zero Do a sanity check on pixclock value to avoid divide by zero. If the pixclock value is zero, the cirrusfb driver will round up pixclock to get the

  • CVE-2021-47639Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU Zap both valid and invalid roots when zapping/unmapping a gfn range, as KVM must ensure it holds no references to the freed page after returning

  • CVE-2021-47638Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: ubifs: rename_whiteout: Fix double free for whiteout_ui->data 'whiteout_ui->data' will be freed twice if space budget fail for rename whiteout operation as following process: rename_whiteout dev = kmalloc

  • CVE-2021-47637Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix deadlock in concurrent rename whiteout and inode writeback Following hung tasks: [ 77.028764] task:kworker/u8:4 state:D stack: 0 pid: 132 [ 77.028820] Call Trace: [ 77.029027] schedule+

  • CVE-2021-47636Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() Function ubifs_wbuf_write_nolock() may access buf out of bounds in following process: ubifs_wbuf_write_nolock(): aligned_len = ALIGN(len, 8); // A

  • CVE-2021-47635Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix to add refcount once page is set private MM defined the rule [1] very clearly that once page was set with PG_private flag, we should increment the refcount in that page, also main flows like pageout(

  • CVE-2021-47633Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 The bug was found during fuzzing. Stacktrace locates it in ath5k_eeprom_convert_pcal_info_5111. When none of the curve is selected in the loop, idx can go up t

  • CVE-2021-47632Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: powerpc/set_memory: Avoid spinlock recursion in change_page_attr() Commit 1f9ad21c3b38 ("powerpc/mm: Implement set_memory() routines") included a spin_lock() to change_page_attr() in order to safely perform the

  • CVE-2021-47631Feb 26, 2025
    affected < 5.14.21-150400.24.158.1fixed 5.14.21-150400.24.158.1

    In the Linux kernel, the following vulnerability has been resolved: ARM: davinci: da850-evm: Avoid NULL pointer dereference With newer versions of GCC, there is a panic in da850_evm_config_emac() when booting multi_v5_defconfig in QEMU under the palmetto-bmc machine: Unable to

  • CVE-2025-21702HigFeb 18, 2025
    affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1

    In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 Expected behaviour: In case we reach scheduler's limit, pfifo_tail_enqueue() will drop a packet in scheduler's queue and decrease scheduler's qlen by one

  • CVE-2025-21703Feb 18, 2025
    affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1

    In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_backlog() notifies parent qdisc only if child qdisc becomes empty, therefore we need to reduce the backlog of the child qdisc befor

  • CVE-2025-21700Feb 13, 2025
    affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1

    In the Linux kernel, the following vulnerability has been resolved: net: sched: Disallow replacing of child qdisc from one parent to another Lion Ackermann was able to create a UAF which can be abused for privilege escalation with the following script Step 1. create root qdisc

  • CVE-2025-21699Feb 12, 2025
    affected < 5.14.21-150400.24.153.1fixed 5.14.21-150400.24.153.1

    In the Linux kernel, the following vulnerability has been resolved: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag Truncate an inode's address space when flipping the GFS2_DIF_JDATA flag: depending on that flag, the pages in the address space will either use buf

  • CVE-2025-21692HigFeb 10, 2025
    affected < 5.14.21-150400.24.153.1fixed 5.14.21-150400.24.153.1

    In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ets qdisc OOB Indexing Haowei Yan <g1042620637@gmail.com> found that ets_class_from_arg() can index an Out-Of-Bound class in ets_class_from_arg() when passed clid of 0. The overflow may cause lo

  • CVE-2025-21693Feb 10, 2025
    affected < 5.14.21-150400.24.161.1fixed 5.14.21-150400.24.161.1

    In the Linux kernel, the following vulnerability has been resolved: mm: zswap: properly synchronize freeing resources during CPU hotunplug In zswap_compress() and zswap_decompress(), the per-CPU acomp_ctx of the current CPU at the beginning of the operation is retrieved and use

  • CVE-2025-21690Feb 10, 2025
    affected < 5.14.21-150400.24.153.1fixed 5.14.21-150400.24.153.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service If there's a persistent error in the hypervisor, the SCSI warning for failed I/O can flood the kernel log and max out CPU utilization, preve

  • CVE-2023-52925Feb 5, 2025
    affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: don't fail inserts if duplicate has expired nftables selftests fail: run-tests.sh testcases/sets/0044interval_overlap_0 Expected: 0-2 . 0-3, got: W: [FAILED] ./testcases/sets/0044inter

Page 88 of 142