VYPR

rpm package

suse/kernel-docs&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP3

pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3

Vulnerabilities (1,468)

  • CVE-2022-50534Oct 7, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: dm thin: Use last transaction's pmd->root when commit failed Recently we found a softlock up problem in dm thin pool btree lookup code due to corrupted metadata: Kernel panic - not syncing: softlockup: hung t

  • CVE-2022-50532Oct 7, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix possible resource leaks in mpt3sas_transport_port_add() In mpt3sas_transport_port_add(), if sas_rphy_add() returns error, sas_rphy_free() needs be called to free the resource allocated in sas

  • CVE-2022-50516Oct 7, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix invalid derefence of sb_lvbptr I experience issues when putting a lkbsb on the stack and have sb_lvbptr field to a dangled pointer while not using DLM_LKF_VALBLK. It will crash with the following k

  • CVE-2022-50513Oct 7, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() In rtw_init_cmd_priv(), if `pcmdpriv->rsp_allocated_buf` is allocated in failure, then `pcmdpriv->cmd_allocated_buf` will be not properly r

  • CVE-2022-50504Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid scheduling in rtas_os_term() It's unsafe to use rtas_busy_delay() to handle a busy status from the ibm,os-term RTAS function in rtas_os_term(): Kernel panic - not syncing: Attempted to kill

  • CVE-2022-50496Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: dm cache: Fix UAF in destroy() Dm_cache also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in destroy().

  • CVE-2022-50494Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash When CPU 0 is offline and intel_powerclamp is used to inject idle, it generates kernel BUG: BUG: using smp_processor_id() i

  • CVE-2022-50493Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix crash when I/O abort times out While performing CPU hotplug, a crash with the following stack was seen: Call Trace: qla24xx_process_response_queue+0x42a/0x970 [qla2xxx] qla2x00_sta

  • CVE-2022-50489Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: drm/mipi-dsi: Detach devices when removing the host Whenever the MIPI-DSI host is unregistered, the code of mipi_dsi_host_unregister() loops over every device currently found on that bus and will unregister it.

  • CVE-2022-50488Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix possible uaf for 'bfqq->bic' Our test report a uaf for 'bfqq->bic' in 5.10: ================================================================== BUG: KASAN: use-after-free in bfq_select_queue+0x3

  • CVE-2023-53574Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: delete timer and free skb queue when unloading Fix possible crash and memory leak on driver unload by deleting TX purge timer and freeing C2H queue in 'rtw_core_deinit()', shrink critical section i

  • CVE-2023-53566Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: fix null deref on element insertion There is no guarantee that rb_prev() will not return NULL in nft_rbtree_gc_elem(): general protection fault, probably for non-canonical address 0x

  • CVE-2023-53564Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix defrag path triggering jbd2 ASSERT code path: ocfs2_ioctl_move_extents ocfs2_move_extents ocfs2_defrag_extent __ocfs2_move_extent + ocfs2_journal_access_di + ocfs2_split_extent //sub-

  • CVE-2023-53559Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix potential slab-use-after-free in decode_session6 When ip_vti device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab-use-after-free may

  • CVE-2022-50484Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential memory leaks When the driver hits -ENOMEM at allocating a URB or a buffer, it aborts and goes to the error path that releases the all previously allocated resources. However, whe

  • CVE-2022-50480Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() The break of for_each_available_child_of_node() needs a corresponding of_node_put() when the reference 'child' is not used anymore. Here we do not n

  • CVE-2022-50470Oct 4, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: xhci: Remove device endpoints from bandwidth list when freeing the device Endpoints are normally deleted from the bandwidth list when they are dropped, before the virt device is freed. If xHC host is dying or

  • CVE-2023-53500Oct 1, 2025
    affected < 5.3.18-150300.59.226.3fixed 5.3.18-150300.59.226.3

    In the Linux kernel, the following vulnerability has been resolved: xfrm: fix slab-use-after-free in decode_session6 When the xfrm device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab-use-after-free may occur when

  • CVE-2023-53492Oct 1, 2025
    affected < 5.3.18-150300.59.221.1fixed 5.3.18-150300.59.221.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not ignore genmask when looking up chain by id When adding a rule to a chain referring to its ID, if that chain had been deleted on the same batch, the rule might end up referring to a

  • CVE-2022-50467Oct 1, 2025
    affected < 5.3.18-150300.59.221.1fixed 5.3.18-150300.59.221.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID An error case exit from lpfc_cmpl_ct_cmd_gft_id() results in a call to lpfc_nlp_put() with a null pointer to a nodelist structure. Cha

Page 2 of 74