rpm package
suse/kernel-default-base&distro=SUSE Linux Enterprise Micro 5.2
pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.2
Vulnerabilities (1,696)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-52973 | — | < 5.3.18-150300.59.201.1.150300.18.120.1 | 5.3.18-150300.59.201.1.150300.18.120.1 | Mar 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF After a call to console_unlock() in vcs_read() the vc_data struct can be freed by vc_deallocate(). Because of that, the struct vc_data p | ||
| CVE-2022-49739 | — | < 5.3.18-150300.59.201.1.150300.18.120.1 | 5.3.18-150300.59.201.1.150300.18.120.1 | Mar 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: gfs2: Always check inode size of inline inodes Check if the inode size of stuffed (inline) inodes is within the allowed range when reading inodes from disk (gfs2_dinode_in()). This prevents us from on-disk cor | ||
| CVE-2023-52935 | — | < 5.3.18-150300.59.201.1.150300.18.120.1 | 5.3.18-150300.59.201.1.150300.18.120.1 | Mar 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: mm/khugepaged: fix ->anon_vma race If an ->anon_vma is attached to the VMA, collapse_and_free_pmd() requires it to be locked. Page table traversal is allowed under any one of the mmap lock, the anon_vma lock ( | ||
| CVE-2023-52927 | Hig | 7.8 | < 5.3.18-150300.59.215.1.150300.18.128.1 | 5.3.18-150300.59.215.1.150300.18.128.1 | Mar 14, 2025 | In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in some scenario, we expect the ex | |
| CVE-2022-49733 | — | < 5.3.18-150300.59.201.1.150300.18.120.1 | 5.3.18-150300.59.201.1.150300.18.120.1 | Mar 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC There is a small race window at snd_pcm_oss_sync() that is called from OSS PCM SNDCTL_DSP_SYNC ioctl; namely the function calls snd_pcm_oss_make_ready() at first, the | ||
| CVE-2025-21812 | — | < 5.3.18-150300.59.207.1.150300.18.124.1 | 5.3.18-150300.59.207.1.150300.18.124.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: ax25: rcu protect dev->ax25_ptr syzbot found a lockdep issue [1]. We should remove ax25 RTNL dependency in ax25_setsockopt() This should also fix a variety of possible UAF in ax25. [1] WARNING: possible cir | ||
| CVE-2025-21772 | Hig | 7.8 | < 5.3.18-150300.59.201.1.150300.18.120.1 | 5.3.18-150300.59.201.1.150300.18.120.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: partitions: mac: fix handling of bogus partition table Fix several issues in partition probing: - The bailout for a bad partoffset must use put_dev_sector(), since the preceding read_part_sector() succeede | |
| CVE-2025-21766 | Med | 5.5 | < 5.3.18-150300.59.235.1.150300.18.140.1 | 5.3.18-150300.59.235.1.150300.18.140.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: ipv4: use RCU protection in __ip_rt_update_pmtu() __ip_rt_update_pmtu() must use RCU protection to make sure the net structure it reads does not disappear. | |
| CVE-2025-21765 | Med | 5.5 | < 5.3.18-150300.59.235.1.150300.18.140.1 | 5.3.18-150300.59.235.1.150300.18.140.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear. | |
| CVE-2025-21764 | Hig | 7.8 | < 5.3.18-150300.59.235.1.150300.18.140.1 | 5.3.18-150300.59.235.1.150300.18.140.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF. | |
| CVE-2025-21760 | Hig | 7.8 | < 5.3.18-150300.59.235.1.150300.18.140.1 | 5.3.18-150300.59.235.1.150300.18.140.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: ndisc: extend RCU protection in ndisc_send_skb() ndisc_send_skb() can be called without RTNL or RCU held. Acquire rcu_read_lock() earlier, so that we can use dev_net_rcu() and avoid a potential UAF. | |
| CVE-2024-58014 | Hig | 7.1 | < 5.3.18-150300.59.201.1.150300.18.120.1 | 5.3.18-150300.59.201.1.150300.18.120.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() In 'wlc_phy_iqcal_gainparams_nphy()', add gain range check to WARN() instead of possible out-of-bounds 'tbl_iqcal_gainparams_nphy' access. | |
| CVE-2025-21791 | — | < 5.3.18-150300.59.204.1.150300.18.122.1 | 5.3.18-150300.59.204.1.150300.18.122.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: vrf: use RCU protection in l3mdev_l3_out() l3mdev_l3_out() can be called without RCU being held: raw_sendmsg() ip_push_pending_frames() ip_send_skb() ip_local_out() __ip_local_out() l3mdev_ip_ou | ||
| CVE-2025-21785 | — | < 5.3.18-150300.59.204.1.150300.18.122.1 | 5.3.18-150300.59.204.1.150300.18.122.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array The loop that detects/populates cache information already has a bounds check on the array size but does not account for cache levels with separate | ||
| CVE-2025-21780 | — | < 5.3.18-150300.59.201.1.150300.18.120.1 | 5.3.18-150300.59.201.1.150300.18.120.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious user provides a small pptable through sysfs and then a bigger pptable, it may cause buffer overflow attack in function smu_sys_set | ||
| CVE-2025-21726 | Hig | 7.8 | < 5.3.18-150300.59.204.1.150300.18.122.1 | 5.3.18-150300.59.204.1.150300.18.122.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: padata: avoid UAF for reorder_work Although the previous patch can avoid ps and ps UAF for _do_serial, it can not avoid potential UAF issue for reorder_work. This issue can happen just as below: crypto_request | |
| CVE-2024-57996 | Med | 5.5 | < 5.3.18-150300.59.201.1.150300.18.120.1 | 5.3.18-150300.59.201.1.150300.18.120.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check in kernel as well. This fixe | |
| CVE-2025-21738 | — | < 5.3.18-150300.59.238.1.150300.18.142.1 | 5.3.18-150300.59.238.1.150300.18.142.1 | Feb 27, 2025 | In the Linux kernel, the following vulnerability has been resolved: ata: libata-sff: Ensure that we cannot write outside the allocated buffer reveliofuzzing reported that a SCSI_IOCTL_SEND_COMMAND ioctl with out_len set to 0xd42, SCSI command set to ATA_16 PASS-THROUGH, ATA com | ||
| CVE-2022-49731 | — | < 5.3.18-150300.59.201.1.150300.18.120.1 | 5.3.18-150300.59.201.1.150300.18.120.1 | Feb 26, 2025 | In the Linux kernel, the following vulnerability has been resolved: ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() In an unlikely (and probably wrong?) case that the 'ppi' parameter of ata_host_alloc_pinfo() points to an array starting with a NULL pointer, t | ||
| CVE-2022-49729 | — | < 5.3.18-150300.59.201.1.150300.18.120.1 | 5.3.18-150300.59.201.1.150300.18.120.1 | Feb 26, 2025 | In the Linux kernel, the following vulnerability has been resolved: nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred Similar to the handling of play_deferred in commit 19cfe912c37b ("Bluetooth: btusb: Fix memory leak in play_deferred"), we thought a patch might be needed |
- CVE-2023-52973Mar 27, 2025affected < 5.3.18-150300.59.201.1.150300.18.120.1fixed 5.3.18-150300.59.201.1.150300.18.120.1
In the Linux kernel, the following vulnerability has been resolved: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF After a call to console_unlock() in vcs_read() the vc_data struct can be freed by vc_deallocate(). Because of that, the struct vc_data p
- CVE-2022-49739Mar 27, 2025affected < 5.3.18-150300.59.201.1.150300.18.120.1fixed 5.3.18-150300.59.201.1.150300.18.120.1
In the Linux kernel, the following vulnerability has been resolved: gfs2: Always check inode size of inline inodes Check if the inode size of stuffed (inline) inodes is within the allowed range when reading inodes from disk (gfs2_dinode_in()). This prevents us from on-disk cor
- CVE-2023-52935Mar 27, 2025affected < 5.3.18-150300.59.201.1.150300.18.120.1fixed 5.3.18-150300.59.201.1.150300.18.120.1
In the Linux kernel, the following vulnerability has been resolved: mm/khugepaged: fix ->anon_vma race If an ->anon_vma is attached to the VMA, collapse_and_free_pmd() requires it to be locked. Page table traversal is allowed under any one of the mmap lock, the anon_vma lock (
- affected < 5.3.18-150300.59.215.1.150300.18.128.1fixed 5.3.18-150300.59.215.1.150300.18.128.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in some scenario, we expect the ex
- CVE-2022-49733Mar 2, 2025affected < 5.3.18-150300.59.201.1.150300.18.120.1fixed 5.3.18-150300.59.201.1.150300.18.120.1
In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC There is a small race window at snd_pcm_oss_sync() that is called from OSS PCM SNDCTL_DSP_SYNC ioctl; namely the function calls snd_pcm_oss_make_ready() at first, the
- CVE-2025-21812Feb 27, 2025affected < 5.3.18-150300.59.207.1.150300.18.124.1fixed 5.3.18-150300.59.207.1.150300.18.124.1
In the Linux kernel, the following vulnerability has been resolved: ax25: rcu protect dev->ax25_ptr syzbot found a lockdep issue [1]. We should remove ax25 RTNL dependency in ax25_setsockopt() This should also fix a variety of possible UAF in ax25. [1] WARNING: possible cir
- affected < 5.3.18-150300.59.201.1.150300.18.120.1fixed 5.3.18-150300.59.201.1.150300.18.120.1
In the Linux kernel, the following vulnerability has been resolved: partitions: mac: fix handling of bogus partition table Fix several issues in partition probing: - The bailout for a bad partoffset must use put_dev_sector(), since the preceding read_part_sector() succeede
- affected < 5.3.18-150300.59.235.1.150300.18.140.1fixed 5.3.18-150300.59.235.1.150300.18.140.1
In the Linux kernel, the following vulnerability has been resolved: ipv4: use RCU protection in __ip_rt_update_pmtu() __ip_rt_update_pmtu() must use RCU protection to make sure the net structure it reads does not disappear.
- affected < 5.3.18-150300.59.235.1.150300.18.140.1fixed 5.3.18-150300.59.235.1.150300.18.140.1
In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.
- affected < 5.3.18-150300.59.235.1.150300.18.140.1fixed 5.3.18-150300.59.235.1.150300.18.140.1
In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF.
- affected < 5.3.18-150300.59.235.1.150300.18.140.1fixed 5.3.18-150300.59.235.1.150300.18.140.1
In the Linux kernel, the following vulnerability has been resolved: ndisc: extend RCU protection in ndisc_send_skb() ndisc_send_skb() can be called without RTNL or RCU held. Acquire rcu_read_lock() earlier, so that we can use dev_net_rcu() and avoid a potential UAF.
- affected < 5.3.18-150300.59.201.1.150300.18.120.1fixed 5.3.18-150300.59.201.1.150300.18.120.1
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() In 'wlc_phy_iqcal_gainparams_nphy()', add gain range check to WARN() instead of possible out-of-bounds 'tbl_iqcal_gainparams_nphy' access.
- CVE-2025-21791Feb 27, 2025affected < 5.3.18-150300.59.204.1.150300.18.122.1fixed 5.3.18-150300.59.204.1.150300.18.122.1
In the Linux kernel, the following vulnerability has been resolved: vrf: use RCU protection in l3mdev_l3_out() l3mdev_l3_out() can be called without RCU being held: raw_sendmsg() ip_push_pending_frames() ip_send_skb() ip_local_out() __ip_local_out() l3mdev_ip_ou
- CVE-2025-21785Feb 27, 2025affected < 5.3.18-150300.59.204.1.150300.18.122.1fixed 5.3.18-150300.59.204.1.150300.18.122.1
In the Linux kernel, the following vulnerability has been resolved: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array The loop that detects/populates cache information already has a bounds check on the array size but does not account for cache levels with separate
- CVE-2025-21780Feb 27, 2025affected < 5.3.18-150300.59.201.1.150300.18.120.1fixed 5.3.18-150300.59.201.1.150300.18.120.1
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious user provides a small pptable through sysfs and then a bigger pptable, it may cause buffer overflow attack in function smu_sys_set
- affected < 5.3.18-150300.59.204.1.150300.18.122.1fixed 5.3.18-150300.59.204.1.150300.18.122.1
In the Linux kernel, the following vulnerability has been resolved: padata: avoid UAF for reorder_work Although the previous patch can avoid ps and ps UAF for _do_serial, it can not avoid potential UAF issue for reorder_work. This issue can happen just as below: crypto_request
- affected < 5.3.18-150300.59.201.1.150300.18.120.1fixed 5.3.18-150300.59.201.1.150300.18.120.1
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check in kernel as well. This fixe
- CVE-2025-21738Feb 27, 2025affected < 5.3.18-150300.59.238.1.150300.18.142.1fixed 5.3.18-150300.59.238.1.150300.18.142.1
In the Linux kernel, the following vulnerability has been resolved: ata: libata-sff: Ensure that we cannot write outside the allocated buffer reveliofuzzing reported that a SCSI_IOCTL_SEND_COMMAND ioctl with out_len set to 0xd42, SCSI command set to ATA_16 PASS-THROUGH, ATA com
- CVE-2022-49731Feb 26, 2025affected < 5.3.18-150300.59.201.1.150300.18.120.1fixed 5.3.18-150300.59.201.1.150300.18.120.1
In the Linux kernel, the following vulnerability has been resolved: ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() In an unlikely (and probably wrong?) case that the 'ppi' parameter of ata_host_alloc_pinfo() points to an array starting with a NULL pointer, t
- CVE-2022-49729Feb 26, 2025affected < 5.3.18-150300.59.201.1.150300.18.120.1fixed 5.3.18-150300.59.201.1.150300.18.120.1
In the Linux kernel, the following vulnerability has been resolved: nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred Similar to the handling of play_deferred in commit 19cfe912c37b ("Bluetooth: btusb: Fix memory leak in play_deferred"), we thought a patch might be needed
Page 22 of 85