VYPR

rpm package

suse/kernel-syms-rt&distro=SUSE Real Time Module 15 SP7

pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7

Vulnerabilities (2,100)

  • CVE-2025-22125MedApr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: md/raid1,raid10: don't ignore IO flags If blk-wbt is enabled by default, it's found that raid write performance is quite bad because all IO are throttled by wbt of underlying disks, due to flag REQ_IDLE is igno

  • CVE-2025-22116MedApr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: idpf: check error for register_netdev() on init Current init logic ignores the error code from register_netdev(), which will cause WARN_ON() on attempt to unregister it, if there was one, and there is no info f

  • CVE-2025-22083HigApr 16, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint If vhost_scsi_set_endpoint is called multiple times without a vhost_scsi_clear_endpoint between them, we can hit multiple bugs found by Haor

  • CVE-2024-58097MedApr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix RCU stall while reaping monitor destination ring While processing the monitor destination ring, MSDUs are reaped from the link descriptor based on the corresponding buf_id. However, sometimes

  • CVE-2024-58096MedApr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode ath11k_hal_srng_* should be used with srng->lock to protect srng data. For ath11k_dp_rx_mon_dest_process() and ath11k_dp_full_mon_process_rx()

  • CVE-2025-23138Apr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: watch_queue: fix pipe accounting mismatch Currently, watch_queue_set_size() modifies the pipe buffers charged to user->pipe_bufs without updating the pipe->nr_accounted on the pipe itself, due to the if (!pipe_

  • CVE-2025-23136Apr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: thermal: int340x: Add NULL check for adev Not all devices have an ACPI companion fwnode, so adev might be NULL. This is similar to the commit cd2fd6eab480 ("platform/x86: int3472: Check for adev == NULL"). Add

  • CVE-2025-23134Apr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: timer: Don't take register_mutex with copy_from/to_user() The infamous mmap_lock taken in copy_from/to_user() can be often problematic when it's called inside another mutex, as they might lead to deadlock

  • CVE-2025-23131Apr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: dlm: prevent NPD when writing a positive value to event_done do_uevent returns the value written to event_done. In case it is a positive value, new_lockspace would undo all the work, and lockspace would not be

  • CVE-2025-23129Apr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path If a shared IRQ is used by the driver due to platform limitation, then the IRQ affinity hint is set right after the allocati

  • CVE-2025-22128Apr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path If a shared IRQ is used by the driver due to platform limitation, then the IRQ affinity hint is set right after the allocatio

  • CVE-2025-22126Apr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: md: fix mddev uaf while iterating all_mddevs list While iterating all_mddevs list from md_notify_reboot() and md_exit(), list_for_each_entry_safe is used, and this can race with deletint the next mddev, causing

  • CVE-2025-22124Apr 16, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb In clustermd, separate write-intent-bitmaps are used for each cluster node: 0 4k 8k 12

  • CVE-2025-22120Apr 16, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: goto right label 'out_mmap_sem' in ext4_setattr() Otherwise, if ext4_inode_attach_jinode() fails, a hung task will happen because filemap_invalidate_unlock() isn't called to unlock mapping->invalidate_loc

  • CVE-2025-22119Apr 16, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: init wiphy_work before allocating rfkill fails syzbort reported a uninitialize wiphy_work_lock in cfg80211_dev_free. [1] After rfkill allocation fails, the wiphy release process will be perform

  • CVE-2025-22113Apr 16, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: avoid journaling sb update on error if journal is destroying Presently we always BUG_ON if trying to start a transaction on a journal marked with JBD2_UNMOUNT, since this should never happen. However, whi

  • CVE-2025-22112Apr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix out-of-range access of vnic_info array The bnxt_queue_{start | stop}() access vnic_info as much as allocated, which indicates bp->nr_vnics. So, it should not reach bp->vnic_info[bp->nr_vnics].

  • CVE-2025-22111Apr 16, 2025
    affected < 6.4.0-150700.7.8.1fixed 6.4.0-150700.7.8.1

    In the Linux kernel, the following vulnerability has been resolved: net: Remove RTNL dance for SIOCBRADDIF and SIOCBRDELIF. SIOCBRDELIF is passed to dev_ioctl() first and later forwarded to br_ioctl_call(), which causes unnecessary RTNL dance and the splat below [0] under RTNL

  • CVE-2025-22109Apr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: ax25: Remove broken autobind Binding AX25 socket by using the autobind feature leads to memory leaks in ax25_connect() and also refcount leaks in ax25_release(). Memory leak was detected with kmemleak: =======

  • CVE-2025-22108Apr 16, 2025
    affected < 6.4.0-150700.7.3.1fixed 6.4.0-150700.7.3.1

    In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Mask the bd_cnt field in the TX BD properly The bd_cnt field in the TX BD specifies the total number of BDs for the TX packet. The bd_cnt field has 5 bits and the maximum number supported is 32 with t

Page 98 of 105