VYPR

rpm package

suse/kernel-source-rt&distro=SUSE Real Time Module 15 SP7

pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7

Vulnerabilities (2,100)

  • CVE-2025-39707Sep 5, 2025
    affected < 6.4.0-150700.7.19.1fixed 6.4.0-150700.7.19.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities HUBBUB structure is not initialized on DCE hardware, so check if it is NULL to avoid null dereference while accessing amdgpu_dm_capabilities

  • CVE-2025-39705Sep 5, 2025
    affected < 6.4.0-150700.7.19.1fixed 6.4.0-150700.7.19.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix a Null pointer dereference vulnerability [Why] A null pointer dereference vulnerability exists in the AMD display driver's (DC module) cleanup function dc_destruct(). When display control c

  • CVE-2025-39695Sep 5, 2025
    affected < 6.4.0-150700.7.19.1fixed 6.4.0-150700.7.19.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Flush delayed SKBs while releasing RXE resources When skb packets are sent out, these skb packets still depends on the rxe resources, for example, QP, sk, when these packets are destroyed. If these r

  • CVE-2025-39679Sep 5, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor(). When the nvif_vmm_type is invalid, we will return error directly without freeing the args in nvif_vmm_ctor(), which leading a memory leak. Fix it

  • CVE-2025-39678Sep 5, 2025
    affected < 6.4.0-150700.7.19.1fixed 6.4.0-150700.7.19.1

    In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL If metric table address is not allocated, accessing metrics_bin will result in a NULL pointer dereference, so add a check.

  • CVE-2025-39677Sep 5, 2025
    affected < 6.4.0-150700.7.19.1fixed 6.4.0-150700.7.19.1

    In the Linux kernel, the following vulnerability has been resolved: net/sched: Fix backlog accounting in qdisc_dequeue_internal This issue applies for the following qdiscs: hhf, fq, fq_codel, and fq_pie, and occurs in their change handlers when adjusting to the new limit. The p

  • CVE-2025-38734Sep 5, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: net/smc: fix UAF on smcsk after smc_listen_out() BPF CI testing report a UAF issue: [ 16.446633] BUG: kernel NULL pointer dereference, address: 000000000000003 0 [ 16.447134] #PF: supervisor read acce

  • CVE-2025-38729HigSep 4, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 power domain descriptors, too UAC3 power domain descriptors need to be verified with its variable bLength for avoiding the unexpected OOB accesses by malicious firmware, too.

  • CVE-2025-38728HigSep 4, 2025
    affected < 6.4.0-150700.7.28.1fixed 6.4.0-150700.7.28.1

    In the Linux kernel, the following vulnerability has been resolved: smb3: fix for slab out of bounds on mount to ksmbd With KASAN enabled, it is possible to get a slab out of bounds during mount to ksmbd due to missing check in parse_server_interfaces() (see below): BUG: KASA

  • CVE-2025-38727MedSep 4, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: netlink: avoid infinite retry looping in netlink_unicast() netlink_attachskb() checks for the socket's read memory allocation constraints. Firstly, it has: rmem < READ_ONCE(sk->sk_rcvbuf) to check if the ju

  • CVE-2025-38725MedSep 4, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: net: usb: asix_devices: add phy_mask for ax88772 mdio bus Without setting phy_mask for ax88772 mdio bus, current driver may create at most 32 mdio phy devices with phy address range from 0x00 ~ 0x1f. DLink DUB-

  • CVE-2025-38724HigSep 4, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() Lei Lu recently reported that nfsd4_setclientid_confirm() did not check the return value from get_client_locked(). a SETCLIENTID_CONFIRM c

  • CVE-2025-38721MedSep 4, 2025
    affected < 6.4.0-150700.7.19.1fixed 6.4.0-150700.7.19.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: fix refcount leak on table dump There is a reference count leak in ctnetlink_dump_table(): if (res < 0) { nf_conntrack_get(&ct->ct_general); // HERE c

  • CVE-2025-38715HigSep 4, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: hfs: fix slab-out-of-bounds in hfs_bnode_read() This patch introduces is_bnode_offset_valid() method that checks the requested offset value. Also, it introduces check_and_correct_requested_length() method that

  • CVE-2025-38714HigSep 4, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() The hfsplus_bnode_read() method can trigger the issue: [ 174.852007][ T9784] ================================================================== [ 174.8

  • CVE-2025-38713HigSep 4, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() The hfsplus_readdir() method is capable to crash by calling hfsplus_uni2asc(): [ 667.121659][ T9805] =================================================

  • CVE-2025-38712MedSep 4, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file() When the volume header contains erroneous values that do not reflect the actual state of the filesystem, hfsplus_fill_super() assumes that the att

  • CVE-2025-38710MedSep 4, 2025
    affected < 6.4.0-150700.7.19.1fixed 6.4.0-150700.7.19.1

    In the Linux kernel, the following vulnerability has been resolved: gfs2: Validate i_depth for exhash directories A fuzzer test introduced corruption that ends up with a depth of 0 in dir_e_read(), causing an undefined shift by 32 at: index = hash >> (32 - dip->i_depth); As

  • CVE-2025-38706MedSep 4, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() snd_soc_remove_pcm_runtime() might be called with rtd == NULL which will leads to null pointer dereference. This was reproduced with topology lo

  • CVE-2025-38702HigSep 4, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: fbdev: fix potential buffer overflow in do_register_framebuffer() The current implementation may lead to buffer overflow when: 1. Unregistration creates NULL gaps in registered_fb[] 2. All array slots become

Page 64 of 105