VYPR

rpm package

suse/kernel-livepatch-SLE15-SP4_Update_48&distro=SUSE Linux Enterprise Live Patching 15 SP4

pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_48&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4

Vulnerabilities (383)

  • CVE-2022-50819Dec 30, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: udmabuf: Set ubuf->sg = NULL if the creation of sg table fails When userspace tries to map the dmabuf and if for some reason (e.g. OOM) the creation of the sg table fails, ubuf->sg needs to be set to NULL. Othe

  • CVE-2022-50814Dec 30, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr KASAN reported this Bug: [17619.659757] BUG: KASAN: global-out-of-bounds in param_get_int+0x34/0x60 [17619.673193] Read of size 4 at addr fffff01332

  • CVE-2022-50809Dec 30, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: xhci: dbc: Fix memory leak in xhci_alloc_dbc() If DbC is already in use, then the allocated memory for the xhci_dbc struct doesn't get freed before returning NULL, which leads to a memleak.

  • CVE-2023-54321Dec 30, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: driver core: fix potential null-ptr-deref in device_add() I got the following null-ptr-deref report while doing fault injection test: BUG: kernel NULL pointer dereference, address: 0000000000000058 CPU: 2 PID:

  • CVE-2023-54159Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: usb: mtu3: fix kernel panic at qmu transfer done irq handler When handle qmu transfer irq, it will unlock @mtu->lock before give back request, if another thread handle disconnect event at the same time, and try

  • CVE-2023-54156Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: sfc: fix crash when reading stats while NIC is resetting efx_net_stats() (.ndo_get_stats64) can be called during an ethtool selftest, during which time nic_data->mc_stats is NULL as the NIC has been fini'd.

  • CVE-2023-54153Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: ext4: turn quotas off if mount failed after enabling quotas Yi found during a review of the patch "ext4: don't BUG on inconsistent journal feature" that when ext4_mark_recovery_complete() returns an error value

  • CVE-2023-54150Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix an out of bounds error in BIOS parser The array is hardcoded to 8 in atomfirmware.h, but firmware provides a bigger one sometimes. Deferencing the larger array causes an out of bounds error. commi

  • CVE-2023-54146Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: x86/kexec: Fix double-free of elf header buffer After b3e34a47f989 ("x86/kexec: fix memory leak of elf header buffer"), freeing image->elf_headers in the error path of crash_load_segments() is not needed be

  • CVE-2023-54142Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: gtp: Fix use-after-free in __gtp_encap_destroy(). syzkaller reported use-after-free in __gtp_encap_destroy(). [0] It shows the same process freed sk and touched it illegally. Commit e198987e7dd7 ("gtp: fix su

  • CVE-2023-54140Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse A syzbot stress test using a corrupted disk image reported that mark_buffer_dirty() called from __nilfs_mark_inode_dirty() or nilfs_palloc_

  • CVE-2023-54136Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: serial: sprd: Fix DMA buffer leak issue Release DMA buffer when _probe() returns failure to avoid memory leak.

  • CVE-2023-54131Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: Fix memory leak when handling surveys When removing a rt2x00 device, its associated channel surveys are not freed, causing a memory leak observable with kmemleak: unreferenced object 0xffff9620f0

  • CVE-2023-54130Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling Commit 55d1cbbbb29e ("hfs/hfsplus: use WARN_ON for sanity check") fixed a build warning by turning a comment into a WARN_ON(), but it tur

  • CVE-2023-54127Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() Syzkaller reported the following issue: ================================================================== BUG: KASAN: double-free in slab_f

  • CVE-2023-54126Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: safexcel - Cleanup ring IRQ workqueues on load failure A failure loading the safexcel driver results in the following warning on boot, because the IRQ affinity has not been correctly cleaned up. Ensure

  • CVE-2023-54123Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix memleak for 'conf->bio_split' In the error path of raid10_run(), 'conf' need be freed, however, 'conf->bio_split' is missed and memory will be leaked. Since there are 3 places to free 'conf', fa

  • CVE-2023-54122Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add check for cstate As kzalloc may fail and return NULL pointer, it should be better to check cstate in order to avoid the NULL pointer dereference in __drm_atomic_helper_crtc_reset. Patchwork: h

  • CVE-2023-54120Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix race condition in hidp_session_thread There is a potential race condition in hidp_session_thread that may lead to use-after-free. For instance, the timer is active while hidp_del_timer is called

  • CVE-2023-54119Dec 24, 2025
    affected < 1-150400.9.7.1fixed 1-150400.9.7.1

    In the Linux kernel, the following vulnerability has been resolved: inotify: Avoid reporting event with invalid wd When inotify_freeing_mark() races with inotify_handle_inode_event() it can happen that inotify_handle_inode_event() sees that i_mark->wd got already reset to -1 an

Page 7 of 20