VYPR

rpm package

suse/kernel-source&distro=SUSE Manager Proxy LTS 4.3

pkg:rpm/suse/kernel-source&distro=SUSE%20Manager%20Proxy%20LTS%204.3

Vulnerabilities (542)

  • CVE-2022-50260Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm: Make .remove and .shutdown HW shutdown consistent Drivers' .remove and .shutdown callbacks are executed on different code paths. The former is called when a device is removed from the bus, while the la

  • CVE-2022-50258Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() This patch fixes a stack-out-of-bounds read in brcmfmac that occurs when 'buf' that is not null-terminated is passed as an argument o

  • CVE-2022-50257Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: xen/gntdev: Prevent leaking grants Prior to this commit, if a grant mapping operation failed partially, some of the entries in the map_ops array would be invalid, whereas all of the entries in the kmap_ops arra

  • CVE-2022-50255Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: tracing: Fix reading strings from synthetic events The follow commands caused a crash: # cd /sys/kernel/tracing # echo 's:open char file[]' > dynamic_events # echo 'hist:keys=common_pid:file=filename:onc

  • CVE-2022-50252Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: igb: Do not free q_vector unless new one was allocated Avoid potential use-after-free condition under memory pressure. If the kzalloc() fails, q_vector will be freed but left in the original adapter->q_vector[v

  • CVE-2022-50251Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: mmc: vub300: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash

  • CVE-2022-50250Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix use_count leakage when handling boot-on I found a use_count leakage towards supply regulator of rdev with boot-on option. ┌───────────────────┐ ┌───────────────────┐ │ regulator

  • CVE-2022-50249Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: memory: of: Fix refcount leak bug in of_get_ddr_timings() We should add the of_node_put() when breaking out of for_each_child_of_node() as it will automatically increase and decrease the refcount.

  • CVE-2022-50248Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix double free on tx path. We see kernel crashes and lockups and KASAN errors related to ax210 firmware crashes. One of the KASAN dumps pointed at the tx path, and it appears there is inde

  • CVE-2022-50247Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: usb: xhci-mtk: fix leakage of shared hcd when fail to set wakeup irq Can not set the @shared_hcd to NULL before decrease the usage count by usb_put_hcd(), this will cause the shared hcd not released.

  • CVE-2022-50246Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpci: fix of node refcount leak in tcpci_register_port() I got the following report while doing device(mt6370-tcpc) load test with CONFIG_OF_UNITTEST and CONFIG_OF_DYNAMIC enabled: OF: ERROR: me

  • CVE-2022-50241Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: NFSD: fix use-after-free on source server when doing inter-server copy Use-after-free occurred when the laundromat tried to free expired cpntf_state entry on the s2s_cp_stateids list after inter-server copy com

  • CVE-2022-50239Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: cpufreq: qcom: fix writes in read-only memory region This commit fixes a kernel oops because of a write in some read-only memory: [ 9.068287] Unable to handle kernel write to read-only memory at virtual ad

  • CVE-2022-50235Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buffer overflow in NFSv2 READDIR Restore the previous limit on the @count argument to prevent a buffer overflow attack.

  • CVE-2022-50234Sep 15, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: io_uring/af_unix: defer registered files gc to io_uring release Instead of putting io_uring's registered files in unix_gc() we want it to be done by io_uring itself. The trick here is to consider io_uring regis

  • CVE-2025-39797Sep 12, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: xfrm: Duplicate SPI Handling The issue originates when Strongswan initiates an XFRM_MSG_ALLOCSPI Netlink message, which triggers the kernel function xfrm_alloc_spi(). This function is expected to ensure uniquen

  • CVE-2025-39790HigSep 11, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Detect events pointing to unexpected TREs When a remote device sends a completion event to the host, it contains a pointer to the consumed TRE. The host uses this pointer to process all of the T

  • CVE-2025-39742MedSep 11, 2025
    affected < 5.14.21-150400.24.184.1fixed 5.14.21-150400.24.184.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() The function divides number of online CPUs by num_core_siblings, and later checks the divider by zero. This implies a possibility to get and divi

  • CVE-2025-39746Sep 11, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: shutdown driver when hardware is unreliable In rare cases, ath10k may lose connection with the PCIe bus due to some unknown reasons, which could further lead to system crashes during resuming due

  • CVE-2025-39703MedSep 5, 2025
    affected < 5.14.21-150400.24.179.1fixed 5.14.21-150400.24.179.1

    In the Linux kernel, the following vulnerability has been resolved: net, hsr: reject HSR frame if skb can't hold tag Receiving HSR frame with insufficient space to hold HSR tag in the skb can result in a crash (kernel BUG): [ 45.390915] skbuff: skb_under_panic: text:ffffffff

Page 23 of 28