rpm package
suse/kernel-64kb&distro=SUSE Linux Enterprise Module for Basesystem 15 SP7
pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP7
Vulnerabilities (2,262)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-23070 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 4, 2026 | In the Linux kernel, the following vulnerability has been resolved: Octeontx2-af: Add proper checks for fwdata firmware populates MAC address, link modes (supported, advertised) and EEPROM data in shared firmware structure which kernel access via MAC block(CGX/RPM). Accessing | ||
| CVE-2026-23069 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 4, 2026 | In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: fix potential underflow in virtio_transport_get_credit() The credit calculation in virtio_transport_get_credit() uses unsigned arithmetic: ret = vvs->peer_buf_alloc - (vvs->tx_cnt - vvs->peer_f | ||
| CVE-2026-23068 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 4, 2026 | In the Linux kernel, the following vulnerability has been resolved: spi: spi-sprd-adi: Fix double free in probe error path The driver currently uses spi_alloc_host() to allocate the controller but registers it using devm_spi_register_controller(). If devm_register_restart_hand | ||
| CVE-2026-23065 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 4, 2026 | In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd: Fix memory leak in wbrf_record() The tmp buffer is allocated using kcalloc() but is not freed if acpi_evaluate_dsm() fails. This causes a memory leak in the error path. Fix this by explicitly | ||
| CVE-2026-23064 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 4, 2026 | In the Linux kernel, the following vulnerability has been resolved: net/sched: act_ife: avoid possible NULL deref tcf_ife_encode() must make sure ife_encode() does not return NULL. syzbot reported: Oops: general protection fault, probably for non-canonical address 0xdffffc000 | ||
| CVE-2026-23063 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 4, 2026 | In the Linux kernel, the following vulnerability has been resolved: uacce: ensure safe queue release with state management Directly calling `put_queue` carries risks since it cannot guarantee that resources of `uacce_queue` have been fully released beforehand. So adding a `stop | ||
| CVE-2026-23062 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 4, 2026 | In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro The GET_INSTANCE_ID macro that caused a kernel panic when accessing sysfs attributes: 1. Off-by-one error: The loop condition used '<=' inste | ||
| CVE-2026-23061 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 4, 2026 | In the Linux kernel, the following vulnerability has been resolved: can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In kvaser_usb_set_{ | ||
| CVE-2026-23060 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 4, 2026 | In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than the minimum expected length, crypto_authenc_esn_decrypt() | ||
| CVE-2026-23038 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 31, 2026 | In the Linux kernel, the following vulnerability has been resolved: pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node() In nfs4_ff_alloc_deviceid_node(), if the allocation for ds_versions fails, the function jumps to the out_scratch label without freeing the alread | ||
| CVE-2026-23037 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 31, 2026 | In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: allow partial RX URB allocation to succeed When es58x_alloc_rx_urbs() fails to allocate the requested number of URBs but succeeds in allocating some, it returns an error code. This causes es58x | ||
| CVE-2026-23035 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 31, 2026 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv mlx5e_priv is an unstable structure that can be memset(0) if profile attaching fails. Pass netdev to mlx5e_destroy_netdev() to guarantee it will w | ||
| CVE-2026-23033 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 31, 2026 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: omap-dma: fix dma_pool resource leak in error paths The dma_pool created by dma_pool_create() is not destroyed when dma_async_device_register() or of_dma_controller_register() fails, causing a resour | ||
| CVE-2026-23026 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 31, 2026 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() Fix a memory leak in gpi_peripheral_config() where the original memory pointed to by gchan->config could be lost if krealloc() fails. The issue | ||
| CVE-2025-71191 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 31, 2026 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: at_hdmac: fix device leak on of_dma_xlate() Make sure to drop the reference taken when looking up the DMA platform device during of_dma_xlate() when releasing channel resources. Note that commit 383 | ||
| CVE-2025-71190 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 31, 2026 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: bcm-sba-raid: fix device leak on probe Make sure to drop the reference taken when looking up the mailbox device during probe on probe failures and on driver unbind. | ||
| CVE-2025-71189 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 31, 2026 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw: dmamux: fix OF node leak on route allocation failure Make sure to drop the reference taken to the DMA master OF node also on late route allocation failures. | ||
| CVE-2025-71188 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 31, 2026 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: lpc18xx-dmamux: fix device leak on route allocation Make sure to drop the reference taken when looking up the DMA mux platform device during route allocation. Note that holding a reference to a devi | ||
| CVE-2025-71185 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 31, 2026 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation Make sure to drop the reference taken when looking up the crossbar platform device during am335x route allocation. | ||
| CVE-2026-23023 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Jan 31, 2026 | In the Linux kernel, the following vulnerability has been resolved: idpf: fix memory leak in idpf_vport_rel() Free vport->rx_ptype_lkup in idpf_vport_rel() to avoid leaking memory during a reset. Reported by kmemleak: unreferenced object 0xff450acac838a000 (size 4096): comm |
- CVE-2026-23070Feb 4, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: Octeontx2-af: Add proper checks for fwdata firmware populates MAC address, link modes (supported, advertised) and EEPROM data in shared firmware structure which kernel access via MAC block(CGX/RPM). Accessing
- CVE-2026-23069Feb 4, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: fix potential underflow in virtio_transport_get_credit() The credit calculation in virtio_transport_get_credit() uses unsigned arithmetic: ret = vvs->peer_buf_alloc - (vvs->tx_cnt - vvs->peer_f
- CVE-2026-23068Feb 4, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: spi: spi-sprd-adi: Fix double free in probe error path The driver currently uses spi_alloc_host() to allocate the controller but registers it using devm_spi_register_controller(). If devm_register_restart_hand
- CVE-2026-23065Feb 4, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd: Fix memory leak in wbrf_record() The tmp buffer is allocated using kcalloc() but is not freed if acpi_evaluate_dsm() fails. This causes a memory leak in the error path. Fix this by explicitly
- CVE-2026-23064Feb 4, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_ife: avoid possible NULL deref tcf_ife_encode() must make sure ife_encode() does not return NULL. syzbot reported: Oops: general protection fault, probably for non-canonical address 0xdffffc000
- CVE-2026-23063Feb 4, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: uacce: ensure safe queue release with state management Directly calling `put_queue` carries risks since it cannot guarantee that resources of `uacce_queue` have been fully released beforehand. So adding a `stop
- CVE-2026-23062Feb 4, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro The GET_INSTANCE_ID macro that caused a kernel panic when accessing sysfs attributes: 1. Off-by-one error: The loop condition used '<=' inste
- CVE-2026-23061Feb 4, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In kvaser_usb_set_{
- CVE-2026-23060Feb 4, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than the minimum expected length, crypto_authenc_esn_decrypt()
- CVE-2026-23038Jan 31, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node() In nfs4_ff_alloc_deviceid_node(), if the allocation for ds_versions fails, the function jumps to the out_scratch label without freeing the alread
- CVE-2026-23037Jan 31, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: allow partial RX URB allocation to succeed When es58x_alloc_rx_urbs() fails to allocate the requested number of URBs but succeeds in allocating some, it returns an error code. This causes es58x
- CVE-2026-23035Jan 31, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv mlx5e_priv is an unstable structure that can be memset(0) if profile attaching fails. Pass netdev to mlx5e_destroy_netdev() to guarantee it will w
- CVE-2026-23033Jan 31, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: dmaengine: omap-dma: fix dma_pool resource leak in error paths The dma_pool created by dma_pool_create() is not destroyed when dma_async_device_register() or of_dma_controller_register() fails, causing a resour
- CVE-2026-23026Jan 31, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() Fix a memory leak in gpi_peripheral_config() where the original memory pointed to by gchan->config could be lost if krealloc() fails. The issue
- CVE-2025-71191Jan 31, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: dmaengine: at_hdmac: fix device leak on of_dma_xlate() Make sure to drop the reference taken when looking up the DMA platform device during of_dma_xlate() when releasing channel resources. Note that commit 383
- CVE-2025-71190Jan 31, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: dmaengine: bcm-sba-raid: fix device leak on probe Make sure to drop the reference taken when looking up the mailbox device during probe on probe failures and on driver unbind.
- CVE-2025-71189Jan 31, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw: dmamux: fix OF node leak on route allocation failure Make sure to drop the reference taken to the DMA master OF node also on late route allocation failures.
- CVE-2025-71188Jan 31, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: dmaengine: lpc18xx-dmamux: fix device leak on route allocation Make sure to drop the reference taken when looking up the DMA mux platform device during route allocation. Note that holding a reference to a devi
- CVE-2025-71185Jan 31, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation Make sure to drop the reference taken when looking up the crossbar platform device during am335x route allocation.
- CVE-2026-23023Jan 31, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: idpf: fix memory leak in idpf_vport_rel() Free vport->rx_ptype_lkup in idpf_vport_rel() to avoid leaking memory during a reset. Reported by kmemleak: unreferenced object 0xff450acac838a000 (size 4096): comm
Page 6 of 114