rpm package
suse/kernel-default&distro=SUSE Linux Enterprise Module for Legacy 15 SP7
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP7
Vulnerabilities (2,262)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-23157 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: btrfs: do not strictly require dirty metadata threshold for metadata writepages [BUG] There is an internal report that over 1000 processes are waiting at the io_schedule_timeout() of balance_dirty_pages(), caus | ||
| CVE-2026-23156 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: efivarfs: fix error propagation in efivar_entry_get() efivar_entry_get() always returns success even if the underlying __efivar_entry_get() fails, masking errors. This may result in uninitialized heap memory b | ||
| CVE-2026-23154 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: net: fix segmentation of forwarding fraglist GRO This patch enhances GSO segment handling by properly checking the SKB_GSO_DODGY flag for frag_list GSO packets, addressing low throughput issues observed when a | ||
| CVE-2026-23152 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly decode TTLM with default link map TID-To-Link Mapping (TTLM) elements do not contain any link mapping presence indicator if a default mapping is used and parsing needs to be skipped. | ||
| CVE-2026-23150 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame(). syzbot reported various memory leaks related to NFC, struct nfc_llcp_sock, sk_buff, nfc_dev, etc. [0] The leading log hinted that nfc_llcp_send_ui_frame() fa | ||
| CVE-2026-23146 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work hci_uart_set_proto() sets HCI_UART_PROTO_INIT before calling hci_uart_register_dev(), which calls proto->open() to initialize hu->priv. However, if | ||
| CVE-2026-23145 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref The error branch for ext4_xattr_inode_update_ref forget to release the refcount for iloc.bh. Find this when review code. | ||
| CVE-2026-23141 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: btrfs: send: check for inline extents in range_is_hole_in_parent() Before accessing the disk_bytenr field of a file extent item we need to check if we are dealing with an inline extent. This is because for inli | ||
| CVE-2026-23113 | Med | 5.5 | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop Currently this is checked before running the pending work. Normally this is quite fine, as work items either end up blocking (which will create a new wo | |
| CVE-2026-23135 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dma_free_coherent() pointer dma_alloc_coherent() allocates a DMA mapped buffer and stores the addresses in XXX_unaligned fields. Those should be reused when freeing the buffer rather than the | ||
| CVE-2026-23133 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: fix dma_free_coherent() pointer dma_alloc_coherent() allocates a DMA mapped buffer and stores the addresses in XXX_unaligned fields. Those should be reused when freeing the buffer rather than the | ||
| CVE-2026-23131 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names The hp-bioscfg driver attempts to register kobjects with empty names when the HP BIOS returns attributes with empty name strings. This ca | ||
| CVE-2026-23129 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: dpll: Prevent duplicate registrations Modify the internal registration helpers dpll_xa_ref_{dpll,pin}_add() to reject duplicate registration attempts. Previously, if a caller attempted to register the same pin | ||
| CVE-2026-23128 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: arm64: Set __nocfi on swsusp_arch_resume() A DABT is reported[1] on an android based system when resume from hiberate. This happens because swsusp_arch_suspend_exit() is marked with SYM_CODE_*() and does not ha | ||
| CVE-2026-23125 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT A null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key initialization fails: =============================================== | ||
| CVE-2026-23121 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: mISDN: annotate data-race around dev->work dev->work can re read locklessly in mISDN_read() and mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations. BUG: KCSAN: data-race in mISDN_ioctl / mISDN_read write | ||
| CVE-2026-23119 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: bonding: provide a net pointer to __skb_flow_dissect() After 3cbf4ffba5ee ("net: plumb network namespace into __skb_flow_dissect") we have to provide a net pointer to __skb_flow_dissect(), either via skb->dev, | ||
| CVE-2026-23116 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu For i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset and clock enable bits, but is ungated and reset together with the | ||
| CVE-2025-71200 | — | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 14, 2026 | In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode When operating in HS200 or HS400 timing modes, reducing the clock frequency below 52MHz will lead to link broken as the Rockchip DWC MS | ||
| CVE-2026-23112 | Cri | 9.8 | < 6.4.0-150700.53.34.1 | 6.4.0-150700.53.34.1 | Feb 13, 2026 | In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU length or offset exceeds sg_cnt and then use bogus sg->length/offset values, leading |
- CVE-2026-23157Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: btrfs: do not strictly require dirty metadata threshold for metadata writepages [BUG] There is an internal report that over 1000 processes are waiting at the io_schedule_timeout() of balance_dirty_pages(), caus
- CVE-2026-23156Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: efivarfs: fix error propagation in efivar_entry_get() efivar_entry_get() always returns success even if the underlying __efivar_entry_get() fails, masking errors. This may result in uninitialized heap memory b
- CVE-2026-23154Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: net: fix segmentation of forwarding fraglist GRO This patch enhances GSO segment handling by properly checking the SKB_GSO_DODGY flag for frag_list GSO packets, addressing low throughput issues observed when a
- CVE-2026-23152Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly decode TTLM with default link map TID-To-Link Mapping (TTLM) elements do not contain any link mapping presence indicator if a default mapping is used and parsing needs to be skipped.
- CVE-2026-23150Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame(). syzbot reported various memory leaks related to NFC, struct nfc_llcp_sock, sk_buff, nfc_dev, etc. [0] The leading log hinted that nfc_llcp_send_ui_frame() fa
- CVE-2026-23146Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work hci_uart_set_proto() sets HCI_UART_PROTO_INIT before calling hci_uart_register_dev(), which calls proto->open() to initialize hu->priv. However, if
- CVE-2026-23145Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref The error branch for ext4_xattr_inode_update_ref forget to release the refcount for iloc.bh. Find this when review code.
- CVE-2026-23141Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: btrfs: send: check for inline extents in range_is_hole_in_parent() Before accessing the disk_bytenr field of a file extent item we need to check if we are dealing with an inline extent. This is because for inli
- affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop Currently this is checked before running the pending work. Normally this is quite fine, as work items either end up blocking (which will create a new wo
- CVE-2026-23135Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dma_free_coherent() pointer dma_alloc_coherent() allocates a DMA mapped buffer and stores the addresses in XXX_unaligned fields. Those should be reused when freeing the buffer rather than the
- CVE-2026-23133Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: fix dma_free_coherent() pointer dma_alloc_coherent() allocates a DMA mapped buffer and stores the addresses in XXX_unaligned fields. Those should be reused when freeing the buffer rather than the
- CVE-2026-23131Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names The hp-bioscfg driver attempts to register kobjects with empty names when the HP BIOS returns attributes with empty name strings. This ca
- CVE-2026-23129Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: dpll: Prevent duplicate registrations Modify the internal registration helpers dpll_xa_ref_{dpll,pin}_add() to reject duplicate registration attempts. Previously, if a caller attempted to register the same pin
- CVE-2026-23128Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: arm64: Set __nocfi on swsusp_arch_resume() A DABT is reported[1] on an android based system when resume from hiberate. This happens because swsusp_arch_suspend_exit() is marked with SYM_CODE_*() and does not ha
- CVE-2026-23125Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT A null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key initialization fails: ===============================================
- CVE-2026-23121Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: mISDN: annotate data-race around dev->work dev->work can re read locklessly in mISDN_read() and mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations. BUG: KCSAN: data-race in mISDN_ioctl / mISDN_read write
- CVE-2026-23119Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: bonding: provide a net pointer to __skb_flow_dissect() After 3cbf4ffba5ee ("net: plumb network namespace into __skb_flow_dissect") we have to provide a net pointer to __skb_flow_dissect(), either via skb->dev,
- CVE-2026-23116Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu For i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset and clock enable bits, but is ungated and reset together with the
- CVE-2025-71200Feb 14, 2026affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode When operating in HS200 or HS400 timing modes, reducing the clock frequency below 52MHz will lead to link broken as the Rockchip DWC MS
- affected < 6.4.0-150700.53.34.1fixed 6.4.0-150700.53.34.1
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU length or offset exceeds sg_cnt and then use bogus sg->length/offset values, leading
Page 3 of 114