rpm package
suse/kernel-default&distro=SUSE Linux Enterprise Server 15 SP3-LTSS
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS
Vulnerabilities (1,483)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-50124 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_nod | ||
| CVE-2022-50118 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable commit 2c9ac51b850d ("powerpc/perf: Fix PMU callbacks to clear pending PMI before resetting an overflown PMC | ||
| CVE-2022-50116 | — | < 5.3.18-150300.59.218.1 | 5.3.18-150300.59.218.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix deadlock and link starvation in outgoing data path The current implementation queues up new control and user packets as needed and processes this queue down to the ldisc in the same code path. T | ||
| CVE-2022-50109 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: video: fbdev: amba-clcd: Fix refcount leak bugs In clcdfb_of_init_display(), we should call of_node_put() for the references returned by of_graph_get_next_endpoint() and of_graph_get_remote_port_parent() which | ||
| CVE-2022-50108 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: mfd: max77620: Fix refcount leak in max77620_initialise_fps of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_ | ||
| CVE-2022-50104 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: powerpc/xive: Fix refcount leak in xive_get_max_prio of_find_node_by_path() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refc | ||
| CVE-2022-50102 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() Since the user can control the arguments of the ioctl() from the user space, under special arguments that may result in a divide-by-zero bug i | ||
| CVE-2022-50101 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: video: fbdev: vt8623fb: Check the size of screen before memset_io() In the function vt8623fb_set_par(), the value of 'screen_size' is calculated by the user input. If the user provides the improper value, the v | ||
| CVE-2022-50099 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: video: fbdev: arkfb: Check the size of screen before memset_io() In the function arkfb_set_par(), the value of 'screen_size' is calculated by the user input. If the user provides the improper value, the value o | ||
| CVE-2022-50098 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts Ensure SRB is returned during I/O timeout error escalation. If that is not possible fail the escalation path. Following crash stack was seen | ||
| CVE-2022-50097 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: video: fbdev: s3fb: Check the size of screen before memset_io() In the function s3fb_set_par(), the value of 'screen_size' is calculated by the user input. If the user provides the improper value, the value of | ||
| CVE-2022-50094 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: spmi: trace: fix stack-out-of-bound access in SPMI tracing functions trace_spmi_write_begin() and trace_spmi_read_end() both call memcpy() with a length of "len + 1". This leads to one extra byte being read be | ||
| CVE-2022-50093 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) KASAN reports: [ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/a | ||
| CVE-2022-50092 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: dm thin: fix use-after-free crash in dm_sm_register_threshold_callback Fault inject on pool metadata device reports: BUG: KASAN: use-after-free in dm_pool_register_metadata_threshold+0x40/0x80 Read of size | ||
| CVE-2022-50091 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: locking/csd_lock: Change csdlock_debug from early_param to __setup The csdlock_debug kernel-boot parameter is parsed by the early_param() function csdlock_debug(). If set, csdlock_debug() invokes static_branch | ||
| CVE-2022-50087 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it | ||
| CVE-2022-50085 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: dm raid: fix address sanitizer warning in raid_resume There is a KASAN warning in raid_resume when running the lvm test lvconvert-raid.sh. The reason for the warning is that mddev->raid_disks is greater than rs | ||
| CVE-2022-50084 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: dm raid: fix address sanitizer warning in raid_status There is this warning when using a kernel with the address sanitizer and running this testsuite: https://gitlab.com/cki-project/kernel-tests/-/tree/main/sto | ||
| CVE-2022-50072 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: NFSv4/pnfs: Fix a use-after-free bug in open If someone cancels the open RPC call, then we must not try to free either the open slot or the layoutget operation arguments, since they are likely still in use by t | ||
| CVE-2022-50067 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() In btrfs_relocate_block_group(), the rc is allocated. Then btrfs_relocate_block_group() calls relocate_block_group() prepare_t |
- CVE-2022-50124Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_nod
- CVE-2022-50118Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable commit 2c9ac51b850d ("powerpc/perf: Fix PMU callbacks to clear pending PMI before resetting an overflown PMC
- CVE-2022-50116Jun 18, 2025affected < 5.3.18-150300.59.218.1fixed 5.3.18-150300.59.218.1
In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix deadlock and link starvation in outgoing data path The current implementation queues up new control and user packets as needed and processes this queue down to the ldisc in the same code path. T
- CVE-2022-50109Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: amba-clcd: Fix refcount leak bugs In clcdfb_of_init_display(), we should call of_node_put() for the references returned by of_graph_get_next_endpoint() and of_graph_get_remote_port_parent() which
- CVE-2022-50108Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: mfd: max77620: Fix refcount leak in max77620_initialise_fps of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_
- CVE-2022-50104Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: powerpc/xive: Fix refcount leak in xive_get_max_prio of_find_node_by_path() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refc
- CVE-2022-50102Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() Since the user can control the arguments of the ioctl() from the user space, under special arguments that may result in a divide-by-zero bug i
- CVE-2022-50101Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: vt8623fb: Check the size of screen before memset_io() In the function vt8623fb_set_par(), the value of 'screen_size' is calculated by the user input. If the user provides the improper value, the v
- CVE-2022-50099Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: arkfb: Check the size of screen before memset_io() In the function arkfb_set_par(), the value of 'screen_size' is calculated by the user input. If the user provides the improper value, the value o
- CVE-2022-50098Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts Ensure SRB is returned during I/O timeout error escalation. If that is not possible fail the escalation path. Following crash stack was seen
- CVE-2022-50097Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: s3fb: Check the size of screen before memset_io() In the function s3fb_set_par(), the value of 'screen_size' is calculated by the user input. If the user provides the improper value, the value of
- CVE-2022-50094Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: spmi: trace: fix stack-out-of-bound access in SPMI tracing functions trace_spmi_write_begin() and trace_spmi_read_end() both call memcpy() with a length of "len + 1". This leads to one extra byte being read be
- CVE-2022-50093Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) KASAN reports: [ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/a
- CVE-2022-50092Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: dm thin: fix use-after-free crash in dm_sm_register_threshold_callback Fault inject on pool metadata device reports: BUG: KASAN: use-after-free in dm_pool_register_metadata_threshold+0x40/0x80 Read of size
- CVE-2022-50091Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: locking/csd_lock: Change csdlock_debug from early_param to __setup The csdlock_debug kernel-boot parameter is parsed by the early_param() function csdlock_debug(). If set, csdlock_debug() invokes static_branch
- CVE-2022-50087Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it
- CVE-2022-50085Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: dm raid: fix address sanitizer warning in raid_resume There is a KASAN warning in raid_resume when running the lvm test lvconvert-raid.sh. The reason for the warning is that mddev->raid_disks is greater than rs
- CVE-2022-50084Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: dm raid: fix address sanitizer warning in raid_status There is this warning when using a kernel with the address sanitizer and running this testsuite: https://gitlab.com/cki-project/kernel-tests/-/tree/main/sto
- CVE-2022-50072Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: NFSv4/pnfs: Fix a use-after-free bug in open If someone cancels the open RPC call, then we must not try to free either the open slot or the layoutget operation arguments, since they are likely still in use by t
- CVE-2022-50067Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() In btrfs_relocate_block_group(), the rc is allocated. Then btrfs_relocate_block_group() calls relocate_block_group() prepare_t
Page 10 of 75