VYPR

rpm package

suse/kernel-livepatch-SLE15-SP6_Update_17&distro=SUSE Linux Enterprise Live Patching 15 SP6

pkg:rpm/suse/kernel-livepatch-SLE15-SP6_Update_17&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6

Vulnerabilities (205)

  • CVE-2023-53588Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check for station first in client probe When probing a client, first check if we have it, and then check for the channel context, otherwise you can trigger the warning there easily by probing wh

  • CVE-2023-53585Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: bpf: reject unhashed sockets in bpf_sk_assign The semantics for bpf_sk_assign are as follows: sk = some_lookup_func() bpf_sk_assign(skb, sk) bpf_sk_release(sk) That is, the sk is not consumed by b

  • CVE-2023-53583Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() Since commit 096b52fd2bb4 ("perf: RISC-V: throttle perf events") the perf_sample_event_took() function was added to report time spent in

  • CVE-2023-53581Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Check for NOT_READY flag state after locking Currently the check for NOT_READY flag is performed before obtaining the necessary lock. This opens a possibility for race condition when the flow is conc

  • CVE-2023-53580Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: USB: Gadget: core: Help prevent panic during UVC unconfigure Avichal Rakesh reported a kernel panic that occurred when the UVC gadget driver was removed from a gadget's configuration. The panic involves a some

  • CVE-2023-53579Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: gpio: mvebu: fix irq domain leak Uwe Kleine-König pointed out we still have one resource leak in the mvebu driver triggered on driver detach. Let's address it with a custom devm action.

  • CVE-2023-53577Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: bpf, cpumap: Make sure kthread is running before map update returns The following warning was reported when running stress-mode enabled xdp_redirect_cpu with some RT threads: ------------[ cut here ]--------

  • CVE-2023-53575Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix potential array out of bounds access Account for IWL_SEC_WEP_KEY_OFFSET when needed while verifying key_len size in iwl_mvm_sec_key_add().

  • CVE-2023-53574Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: delete timer and free skb queue when unloading Fix possible crash and memory leak on driver unload by deleting TX purge timer and freeing C2H queue in 'rtw_core_deinit()', shrink critical section i

  • CVE-2023-53572Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: use _safe list iterator to avoid a use after free This loop is freeing "clk" so it needs to use list_for_each_entry_safe(). Otherwise it dereferences a freed variable to get the next item on the

  • CVE-2023-53570Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems() nl80211_parse_mbssid_elems() uses a u8 variable num_elems to count the number of MBSSID elements in the nested netlink attribute attrs, which

  • CVE-2023-53568Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: don't leak memory if dev_set_name() fails When dev_set_name() fails, zcdn_create() doesn't free the newly allocated resources. Do it.

  • CVE-2023-53563Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver After loading the amd-pstate-ut driver, amd_pstate_ut_check_perf() and amd_pstate_ut_check_freq() use cpufreq_cpu_get() to get the policy of the

  • CVE-2023-53560Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: tracing/histograms: Add histograms to hist_vars if they have referenced variables Hist triggers can have referenced variables without having direct variables fields. This can be the case if referenced variables

  • CVE-2023-53559Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix potential slab-use-after-free in decode_session6 When ip_vti device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab-use-after-free may

  • CVE-2023-53558Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic() pr_info() is called with rtp->cbs_gbl_lock spin lock locked. Because pr_info() calls printk() that might sleep, this will result in BUG like b

  • CVE-2023-53557Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: fprobe: Release rethook after the ftrace_ops is unregistered While running bpf selftests it's possible to get following fault: general protection fault, probably for non-canonical address \ 0x6b6b6b6b6b6b6

  • CVE-2023-53556Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: iavf: Fix use-after-free in free_netdev We do netif_napi_add() for all allocated q_vectors[], but potentially do netif_napi_del() for part of them, then kfree q_vectors and leave invalid pointers at dev->napi_l

  • CVE-2023-53555Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: initialize damo_filter->list from damos_new_filter() damos_new_filter() is not initializing the list field of newly allocated filter object. However, DAMON sysfs interface and DAMON_RECLAIM are

  • CVE-2023-53554Oct 4, 2025
    affected < 1-150600.13.5.1fixed 1-150600.13.5.1

    In the Linux kernel, the following vulnerability has been resolved: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() The "exc->key_len" is a u16 that comes from the user. If it's over IW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption.

Page 8 of 11