VYPR

rpm package

suse/kernel-syms&distro=SUSE Linux Enterprise Module for Development Tools 15 SP7

pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP7

Vulnerabilities (2,262)

  • CVE-2025-68795Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing userspace buffer on stats query The ethtool -S command operates across three ioctl calls: ETHTOOL_GSSET_INFO for the size, ETHTOOL_GSTRINGS for the names, and ETHTOOL_GSTATS for the v

  • CVE-2025-68788Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: fsnotify: do not generate ACCESS/MODIFY events on child for special files inotify/fanotify do not allow users with no read access to a file to subscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow t

  • CVE-2025-68785Jan 13, 2026
    affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1

    In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix middle attribute validation in push_nsh() action The push_nsh() action structure looks like this: OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...)) The outermost OVS

  • CVE-2025-68783Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-mixer: us16x08: validate meter packet indices get_meter_levels_from_urb() parses the 64-byte meter packets sent by the device and fills the per-channel arrays meter_level[], comp_level[] and master_le

  • CVE-2025-68778Jan 13, 2026
    affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: don't log conflicting inode if it's a dir moved in the current transaction We can't log a conflicting inode if it's a directory and it was moved from one parent directory to another parent directory in t

  • CVE-2025-68777Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: Input: ti_am335x_tsc - fix off-by-one error in wire_order validation The current validation 'wire_order[i] > ARRAY_SIZE(config_pins)' allows wire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-b

  • CVE-2025-68776Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() prp_get_untagged_frame() calls __pskb_copy() to create frame->skb_std but doesn't check if the allocation failed. If __pskb_copy() returns NULL,

  • CVE-2025-68775Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: net/handshake: duplicate handshake cancellations leak socket When a handshake request is cancelled it is removed from the handshake_net->hn_requests list, but it is still present in the handshake_rhashtbl until

  • CVE-2025-68773Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: spi: fsl-cpm: Check length parity before switching to 16 bit mode Commit fc96ec826bce ("spi: fsl-cpm: Use 16 bit mode for large transfers with even size") failed to make sure that the size is really even before

  • CVE-2025-68771Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix kernel BUG in ocfs2_find_victim_chain syzbot reported a kernel BUG in ocfs2_find_victim_chain() because the `cl_next_free_rec` field of the allocation chain list (next free slot in the chain list) is

  • CVE-2025-68770Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix XDP_TX path For XDP_TX action in bnxt_rx_xdp(), clearing of the event flags is not correct. __bnxt_poll_work() -> bnxt_rx_pkt() -> bnxt_rx_xdp() may be looping within NAPI and some event flags may

  • CVE-2025-68768Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: inet: frags: flush pending skbs in fqdir_pre_exit() We have been seeing occasional deadlocks on pernet_ops_rwsem since September in NIPA. The stuck task was usually modprobe (often loading a driver like ipvlan)

  • CVE-2025-71101Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing The hp_populate_*_elements_from_package() functions in the hp-bioscfg driver contain out-of-bounds array access vulnerabilities.

  • CVE-2025-71100Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc() TID getting from ieee80211_get_tid() might be out of range of array size of sta_entry->tids[], so check TID is less than MAX_TID_COUNT. Othw

  • CVE-2025-71099Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl() In xe_oa_add_config_ioctl(), we accessed oa_config->id after dropping metrics_lock. Since this lock protects the lifetime of oa_config, an attacker could

  • CVE-2025-71098Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: ip6_gre: make ip6gre_header() robust Over the years, syzbot found many ways to crash the kernel in ip6gre_header() [1]. This involves team or bonding drivers ability to dynamically change their dev->needed_hea

  • CVE-2025-71097Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix reference count leak when using error routes with nexthop objects When a nexthop object is deleted, it is marked as dead and then fib_table_flush() is called to flush all the routes that are using the

  • CVE-2025-71096Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly The netlink response for RDMA_NL_LS_OP_IP_RESOLVE should always have a LS_NLA_TYPE_DGID attribute, it is invalid if it does not. Use the nl parsi

  • CVE-2025-71095Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix the crash issue for zero copy XDP_TX action There is a crash issue when running zero copy XDP_TX action, the crash log is shown below. [ 216.122464] Unable to handle kernel paging request at

  • CVE-2025-71094Jan 13, 2026
    affected < 6.4.0-150700.53.31.1fixed 6.4.0-150700.53.31.1

    In the Linux kernel, the following vulnerability has been resolved: net: usb: asix: validate PHY address before use The ASIX driver reads the PHY address from the USB device via asix_read_phy_addr(). A malicious or faulty device can return an invalid address (>= PHY_MAX_ADDR),

Page 11 of 114