rpm package
suse/kernel-default&distro=SUSE Linux Enterprise Micro 5.2
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.2
Vulnerabilities (1,696)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-54270 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: media: usb: siano: Fix use after free bugs caused by do_submit_urb There are UAF bugs caused by do_submit_urb(). One of the KASan reports is shown below: [ 36.403605] BUG: KASAN: use-after-free in worker_thr | ||
| CVE-2023-54243 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: netfilter: ebtables: fix table blob use-after-free We are not allowed to return an error at this point. Looking at the code it looks like ret is always 0 at this point, but its not. t = find_table_lock(net, re | ||
| CVE-2023-54242 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: block, bfq: Fix division by zero error on zero wsum When the weighted sum is zero the calculation of limit causes a division by zero error. Fix this by continuing to the next level. This was discovered by runn | ||
| CVE-2023-54170 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: keys: Fix linking a duplicate key to a keyring's assoc_array When making a DNS query inside the kernel using dns_query(), the request code can in rare cases end up creating a duplicate index key in the assoc_ar | ||
| CVE-2023-54168 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() The ucmd->log_sq_bb_count variable is controlled by the user so this shift can wrap. Fix it by using check_shl_overflow() in the same way that it was don | ||
| CVE-2022-50889 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: dm integrity: Fix UAF in dm_integrity_dtr() Dm_integrity also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in dm_integrity_dtr(). | ||
| CVE-2022-50884 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm: Prevent drm_copy_field() to attempt copying a NULL pointer There are some struct drm_driver fields that are required by drivers since drm_copy_field() attempts to copy them to user-space via DRM_IOCTL_VERS | ||
| CVE-2022-50880 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() When peer delete failed in a disconnect operation, use-after-free detected by KFENCE in below log. It is because for each vdev_id and ad | ||
| CVE-2022-50876 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: usb: musb: Fix musb_gadget.c rxstate overflow bug The usb function device call musb_gadget_queue() adds the passed request to musb_ep::req_list,If the (request->length > musb_ep->packet_sz) and (is_buffer_mappe | ||
| CVE-2022-50870 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid device tree lookups in rtas_os_term() rtas_os_term() is called during panic. Its behavior depends on a couple of conditions in the /rtas node of the device tree, the traversal of which entai | ||
| CVE-2022-50850 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: ipr: Fix WARNING in ipr_init() ipr_init() will not call unregister_reboot_notifier() when pci_register_driver() fails, which causes a WARNING. Call unregister_reboot_notifier() when pci_register_driver() | ||
| CVE-2022-50843 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: dm clone: Fix UAF in clone_dtr() Dm_clone also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in clone_dtr(). | ||
| CVE-2022-50840 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: snic: Fix possible UAF in snic_tgt_create() Smatch reports a warning as follows: drivers/scsi/snic/snic_disc.c:307 snic_tgt_create() warn: '&tgt->list' not removed from list If device_add() fails in s | ||
| CVE-2022-50828 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: clk: zynqmp: Fix stack-out-of-bounds in strncpy` "BUG: KASAN: stack-out-of-bounds in strncpy+0x30/0x68" Linux-ATF interface is using 16 bytes of SMC payload. In case clock name is longer than 15 bytes, string | ||
| CVE-2022-50827 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix memory leak in lpfc_create_port() Commit 5e633302ace1 ("scsi: lpfc: vmid: Add support for VMID in mailbox command") introduced allocations for the VMID resources in lpfc_create_port() after the | ||
| CVE-2022-50823 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: clk: tegra: Fix refcount leak in tegra114_clock_init of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() | ||
| CVE-2022-50821 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails | ||
| CVE-2022-50814 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr KASAN reported this Bug: [17619.659757] BUG: KASAN: global-out-of-bounds in param_get_int+0x34/0x60 [17619.673193] Read of size 4 at addr fffff01332 | ||
| CVE-2023-54142 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: gtp: Fix use-after-free in __gtp_encap_destroy(). syzkaller reported use-after-free in __gtp_encap_destroy(). [0] It shows the same process freed sk and touched it illegally. Commit e198987e7dd7 ("gtp: fix su | ||
| CVE-2023-54110 | — | < 5.3.18-150300.59.232.1 | 5.3.18-150300.59.232.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: usb: rndis_host: Secure rndis_query check against int overflow Variables off and len typed as uint32 in rndis_query function are controlled by incoming RNDIS response message thus their value may be manipulated |
- CVE-2023-54270Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: media: usb: siano: Fix use after free bugs caused by do_submit_urb There are UAF bugs caused by do_submit_urb(). One of the KASan reports is shown below: [ 36.403605] BUG: KASAN: use-after-free in worker_thr
- CVE-2023-54243Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: ebtables: fix table blob use-after-free We are not allowed to return an error at this point. Looking at the code it looks like ret is always 0 at this point, but its not. t = find_table_lock(net, re
- CVE-2023-54242Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: block, bfq: Fix division by zero error on zero wsum When the weighted sum is zero the calculation of limit causes a division by zero error. Fix this by continuing to the next level. This was discovered by runn
- CVE-2023-54170Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: keys: Fix linking a duplicate key to a keyring's assoc_array When making a DNS query inside the kernel using dns_query(), the request code can in rare cases end up creating a duplicate index key in the assoc_ar
- CVE-2023-54168Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() The ucmd->log_sq_bb_count variable is controlled by the user so this shift can wrap. Fix it by using check_shl_overflow() in the same way that it was don
- CVE-2022-50889Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: dm integrity: Fix UAF in dm_integrity_dtr() Dm_integrity also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in dm_integrity_dtr().
- CVE-2022-50884Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: drm: Prevent drm_copy_field() to attempt copying a NULL pointer There are some struct drm_driver fields that are required by drivers since drm_copy_field() attempts to copy them to user-space via DRM_IOCTL_VERS
- CVE-2022-50880Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() When peer delete failed in a disconnect operation, use-after-free detected by KFENCE in below log. It is because for each vdev_id and ad
- CVE-2022-50876Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: usb: musb: Fix musb_gadget.c rxstate overflow bug The usb function device call musb_gadget_queue() adds the passed request to musb_ep::req_list,If the (request->length > musb_ep->packet_sz) and (is_buffer_mappe
- CVE-2022-50870Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid device tree lookups in rtas_os_term() rtas_os_term() is called during panic. Its behavior depends on a couple of conditions in the /rtas node of the device tree, the traversal of which entai
- CVE-2022-50850Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: scsi: ipr: Fix WARNING in ipr_init() ipr_init() will not call unregister_reboot_notifier() when pci_register_driver() fails, which causes a WARNING. Call unregister_reboot_notifier() when pci_register_driver()
- CVE-2022-50843Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: dm clone: Fix UAF in clone_dtr() Dm_clone also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in clone_dtr().
- CVE-2022-50840Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: scsi: snic: Fix possible UAF in snic_tgt_create() Smatch reports a warning as follows: drivers/scsi/snic/snic_disc.c:307 snic_tgt_create() warn: '&tgt->list' not removed from list If device_add() fails in s
- CVE-2022-50828Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: clk: zynqmp: Fix stack-out-of-bounds in strncpy` "BUG: KASAN: stack-out-of-bounds in strncpy+0x30/0x68" Linux-ATF interface is using 16 bytes of SMC payload. In case clock name is longer than 15 bytes, string
- CVE-2022-50827Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix memory leak in lpfc_create_port() Commit 5e633302ace1 ("scsi: lpfc: vmid: Add support for VMID in mailbox command") introduced allocations for the VMID resources in lpfc_create_port() after the
- CVE-2022-50823Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: clk: tegra: Fix refcount leak in tegra114_clock_init of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put()
- CVE-2022-50821Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails
- CVE-2022-50814Dec 30, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr KASAN reported this Bug: [17619.659757] BUG: KASAN: global-out-of-bounds in param_get_int+0x34/0x60 [17619.673193] Read of size 4 at addr fffff01332
- CVE-2023-54142Dec 24, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: gtp: Fix use-after-free in __gtp_encap_destroy(). syzkaller reported use-after-free in __gtp_encap_destroy(). [0] It shows the same process freed sk and touched it illegally. Commit e198987e7dd7 ("gtp: fix su
- CVE-2023-54110Dec 24, 2025affected < 5.3.18-150300.59.232.1fixed 5.3.18-150300.59.232.1
In the Linux kernel, the following vulnerability has been resolved: usb: rndis_host: Secure rndis_query check against int overflow Variables off and len typed as uint32 in rndis_query function are controlled by incoming RNDIS response message thus their value may be manipulated
Page 2 of 85