VYPR

rpm package

suse/kernel-default&distro=SUSE Linux Enterprise Module for Legacy 15 SP7

pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP7

Vulnerabilities (2,262)

  • CVE-2023-53823Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: block/rq_qos: protect rq_qos apis with a new lock commit 50e34d78815e ("block: disable the elevator int del_gendisk") move rq_qos_exit() from disk_release() to del_gendisk(), this will introduce some problems:

  • CVE-2023-53821Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: ip6_vti: fix slab-use-after-free in decode_session6 When ipv6_vti device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab-use-after-free may occur w

  • CVE-2023-53819Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va This is motivated by OOB access in amdgpu_vm_update_range when offset_in_bo+map_size overflows. v2: keep the validations in amdgpu_vm_bo_map v3: add the valid

  • CVE-2023-53817Dec 9, 2025
    affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() During NVMeTCP Authentication a controller can trigger a kernel oops by specifying the 8192 bit Diffie Hellman group and passing a correctly sized, but

  • CVE-2023-53815Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: posix-timers: Prevent RT livelock in itimer_delete() itimer_delete() has a retry loop when the timer is concurrently expired. On non-RT kernels this just spin-waits until the timer callback has completed, excep

  • CVE-2023-53813Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix rbtree traversal bug in ext4_mb_use_preallocated During allocations, while looking for preallocations(PA) in the per inode rbtree, we can't do a direct traversal of the tree because ext4_mb_discard_gr

  • CVE-2023-53808Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: fix memory leak in mwifiex_histogram_read() Always free the zeroed page on return from 'mwifiex_histogram_read()'.

  • CVE-2023-53807Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: clk: clocking-wizard: Fix Oops in clk_wzrd_register_divider() Smatch detected this potential error pointer dereference clk_wzrd_register_divider(). If devm_clk_hw_register() fails then it sets "hw" to an error

  • CVE-2023-53799Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: api - Use work queue in crypto_destroy_instance The function crypto_drop_spawn expects to be called in process context. However, when an instance is unregistered while it still has active users, the la

  • CVE-2023-53797Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: HID: wacom: Use ktime_t rather than int when dealing with timestamps Code which interacts with timestamps needs to use the ktime_t type returned by functions like ktime_get. The int type does not offer enough s

  • CVE-2023-53795Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: iommufd: IOMMUFD_DESTROY should not increase the refcount syzkaller found a race where IOMMUFD_DESTROY increments the refcount: obj = iommufd_get_object(ucmd->ictx, cmd->id, IOMMUFD_OBJ_ANY); if

  • CVE-2023-53794Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: cifs: fix session state check in reconnect to avoid use-after-free issue Don't collect exiting session in smb2_reconnect_server(), because it will be released soon. Note that the exiting session will stay in s

  • CVE-2023-53793Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: perf tool x86: Fix perf_env memory leak Found by leak sanitizer: ``` ==1632594==ERROR: LeakSanitizer: detected memory leaks Direct leak of 21 byte(s) in 1 object(s) allocated from: #0 0x7f2953a7077b in __i

  • CVE-2023-53792Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: nvme-core: fix memory leak in dhchap_ctrl_secret Free dhchap_secret in nvme_ctrl_dhchap_ctrl_secret_store() before we return when nvme_auth_generate_key() returns error.

  • CVE-2023-53791Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: md: fix warning for holder mismatch from export_rdev() Commit a1d767191096 ("md: use mddev->external to select holder in export_rdev()") fix the problem that 'claim_rdev' is used for blkdev_get_by_dev() while '

  • CVE-2023-53787Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: regulator: da9063: fix null pointer deref with partial DT config When some of the da9063 regulators do not have corresponding DT nodes a null pointer dereference occurs on boot because such regulators have no i

  • CVE-2023-53785Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: mt76: mt7921: don't assume adequate headroom for SDIO headers mt7921_usb_sdio_tx_prepare_skb() calls mt7921_usb_sdio_write_txwi() and mt7921_skb_add_usb_sdio_hdr(), both of which blindly assume that adequate he

  • CVE-2023-53784Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: drm: bridge: dw_hdmi: fix connector access for scdc Commit 5d844091f237 ("drm/scdc-helper: Pimp SCDC debugs") changed the scdc interface to pick up an i2c adapter from a connector instead. However, in the case

  • CVE-2023-53782Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: dccp: Fix out of bounds access in DCCP error handler There was a previous attempt to fix an out-of-bounds access in the DCCP error handlers, but that fix assumed that the error handlers only want to access the

  • CVE-2023-53778Dec 9, 2025
    affected < 6.4.0-150700.53.28.1fixed 6.4.0-150700.53.28.1

    In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Clean up integer overflow checking in map_user_pages() The encode_dma() function has some validation on in_trans->size but it would be more clear to move those checks to find_and_map_user_pages().

Page 29 of 114