VYPR

rpm package

suse/kernel-docs&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP5

pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5

Vulnerabilities (2,310)

  • CVE-2023-53615Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix deletion race condition System crash when using debug kernel due to link list corruption. The cause of the link list corruption is due to session deletion was allowed to queue up twice. Here

  • CVE-2023-53612Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Simplify platform device handling Coretemp's platform driver is unconventional. All the real work is done globally by the initcall and CPU hotplug notifiers, while the "driver" effectively jus

  • CVE-2023-53611Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: ipmi_si: fix a memleak in try_smi_init() Kmemleak reported the following leak info in try_smi_init(): unreferenced object 0xffff00018ecf9400 (size 1024): comm "modprobe", pid 2707763, jiffies 4300851415 (age

  • CVE-2023-53608Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() The finalization of nilfs_segctor_thread() can race with nilfs_segctor_kill_thread() which terminates that thread, potentially causing

  • CVE-2023-53607Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: ALSA: ymfpci: Fix BUG_ON in probe function The snd_dma_buffer.bytes field now contains the aligned size, which this snd_BUG_ON() did not account for, resulting in the following: [ 9.625915] ------------[ cu

  • CVE-2023-53605Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: drm: amd: display: Fix memory leakage This commit fixes memory leakage in dc_construct_ctx() function.

  • CVE-2023-53604Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path Otherwise the journal_io_cache will leak if dm_register_target() fails.

  • CVE-2023-53603Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Avoid fcport pointer dereference Klocwork reported warning of NULL pointer may be dereferenced. The routine exits when sa_ctl is NULL and fcport is allocated after the exit call thus causing NUL

  • CVE-2023-53601Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: bonding: do not assume skb mac_header is set Drivers must not assume in their ndo_start_xmit() that skbs have their mac_header set. skb->data is all what is needed. bonding seems to be one of the last offender

  • CVE-2023-53598Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Range check CHDBOFF and ERDBOFF If the value read from the CHDBOFF and ERDBOFF registers is outside the range of the MHI register space then an invalid address might be computed which later caus

  • CVE-2023-53597Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: cifs: fix mid leak during reconnection after timeout threshold When the number of responses with status of STATUS_IO_TIMEOUT exceeds a specified threshold (NUM_STATUS_IO_TIMEOUT), we reconnect the connection. B

  • CVE-2023-53594Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: driver core: fix resource leak in device_add() When calling kobject_add() failed in device_add(), it will call cleanup_glue_dir() to free resource. But in kobject_add(), dev->kobj.parent has been set to NULL. T

  • CVE-2023-53592Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: gpio: sifive: Fix refcount leak in sifive_gpio_probe of_irq_find_parent() returns a node pointer with refcount incremented, We should use of_node_put() on it when not needed anymore. Add missing of_node_put() t

  • CVE-2023-53591Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix deadlock in tc route query code Cited commit causes ABBA deadlock[0] when peer flows are created while holding the devcom rw semaphore. Due to peer flows offload implementation the lock is taken

  • CVE-2023-53589Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't trust firmware n_channels If the firmware sends us a corrupted MCC response with n_channels much larger than the command response can be, we might copy far too much (uninitialized) mem

  • CVE-2023-53587Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Sync IRQ works before buffer destruction If something was written to the buffer just before destruction, it may be possible (maybe not in a real system, but it did happen in ARCH=um with time-trave

  • CVE-2023-53582Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds Fix a stack-out-of-bounds read in brcmfmac that occurs when 'buf' that is not null-terminated is passed as an argument of str

  • CVE-2023-53581Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Check for NOT_READY flag state after locking Currently the check for NOT_READY flag is performed before obtaining the necessary lock. This opens a possibility for race condition when the flow is conc

  • CVE-2023-53580Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: USB: Gadget: core: Help prevent panic during UVC unconfigure Avichal Rakesh reported a kernel panic that occurred when the UVC gadget driver was removed from a gadget's configuration. The panic involves a some

  • CVE-2022-50505Oct 4, 2025
    affected < 5.14.21-150500.55.127.1fixed 5.14.21-150500.55.127.1

    In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix pci device refcount leak in ppr_notifier() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the r

Page 28 of 116