rpm package
suse/kernel-rt&distro=SUSE Linux Enterprise Micro 5.4
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4
Vulnerabilities (2,952)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-54177 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: quota: fix warning in dqgrab() There's issue as follows when do fault injection: WARNING: CPU: 1 PID: 14870 at include/linux/quotaops.h:51 dquot_disable+0x13b7/0x18c0 Modules linked in: CPU: 1 PID: 14870 Comm: | ||
| CVE-2023-54173 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: bpf: Disable preemption in bpf_event_output We received report [1] of kernel crash, which is caused by using nesting protection without disabled preemption. The bpf_event_output can be called by programs execu | ||
| CVE-2023-54171 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: tracing: Fix memory leak of iter->temp when reading trace_pipe kmemleak reports: unreferenced object 0xffff88814d14e200 (size 256): comm "cat", pid 336, jiffies 4294871818 (age 779.490s) hex dump (fir | ||
| CVE-2023-54170 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: keys: Fix linking a duplicate key to a keyring's assoc_array When making a DNS query inside the kernel using dns_query(), the request code can in rare cases end up creating a duplicate index key in the assoc_ar | ||
| CVE-2023-54168 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() The ucmd->log_sq_bb_count variable is controlled by the user so this shift can wrap. Fix it by using check_shl_overflow() in the same way that it was don | ||
| CVE-2023-54166 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: igc: Fix Kernel Panic during ndo_tx_timeout callback The Xeon validation group has been carrying out some loaded tests with various HW configurations, and they have seen some transmit queue time out happening d | ||
| CVE-2022-50889 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: dm integrity: Fix UAF in dm_integrity_dtr() Dm_integrity also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in dm_integrity_dtr(). | ||
| CVE-2022-50888 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: remoteproc: qcom: q6v5: Fix potential null-ptr-deref in q6v5_wcss_init_mmio() q6v5_wcss_init_mmio() will call platform_get_resource_byname() that may fail and return NULL. devm_ioremap() will use res->start as | ||
| CVE-2022-50887 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix unbalanced of node refcount in regulator_dev_lookup() I got the the following report: OF: ERROR: memory leak, expected refcount 1 instead of 2, of_node_get()/of_node_put() unbalanced - | ||
| CVE-2022-50886 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: mmc: toshsd: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash | ||
| CVE-2022-50885 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when socket create failed There is a null-ptr-deref when mount.cifs over rdma: BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe] Rea | ||
| CVE-2022-50884 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm: Prevent drm_copy_field() to attempt copying a NULL pointer There are some struct drm_driver fields that are required by drivers since drm_copy_field() attempts to copy them to user-space via DRM_IOCTL_VERS | ||
| CVE-2022-50882 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix memory leak in uvc_gpio_parse Previously the unit buffer was allocated before checking the IRQ for privacy GPIO. In case of error, the unit buffer was leaked. Allocate the unit buffer afte | ||
| CVE-2022-50881 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() This patch fixes a use-after-free in ath9k that occurs in ath9k_hif_usb_disconnect() when ath9k_destroy_wmi() is trying to access 'drv_priv' that ha | ||
| CVE-2022-50880 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() When peer delete failed in a disconnect operation, use-after-free detected by KFENCE in below log. It is because for each vdev_id and ad | ||
| CVE-2022-50878 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init() A NULL check for bridge->encoder shows that it may be NULL, but it already been dereferenced on all paths leading to the check. 812 i | ||
| CVE-2022-50876 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: usb: musb: Fix musb_gadget.c rxstate overflow bug The usb function device call musb_gadget_queue() adds the passed request to musb_ep::req_list,If the (request->length > musb_ep->packet_sz) and (is_buffer_mappe | ||
| CVE-2022-50872 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: ARM: OMAP2+: Fix memory leak in realtime_counter_init() The "sys_clk" resource is malloced by clk_get(), it is not released when the function return. | ||
| CVE-2022-50870 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid device tree lookups in rtas_os_term() rtas_os_term() is called during panic. Its behavior depends on a couple of conditions in the /rtas node of the device tree, the traversal of which entai | ||
| CVE-2022-50868 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 30, 2025 | In the Linux kernel, the following vulnerability has been resolved: hwrng: amd - Fix PCI device refcount leak for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the returned pci_dev and also |
- CVE-2023-54177Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: quota: fix warning in dqgrab() There's issue as follows when do fault injection: WARNING: CPU: 1 PID: 14870 at include/linux/quotaops.h:51 dquot_disable+0x13b7/0x18c0 Modules linked in: CPU: 1 PID: 14870 Comm:
- CVE-2023-54173Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: bpf: Disable preemption in bpf_event_output We received report [1] of kernel crash, which is caused by using nesting protection without disabled preemption. The bpf_event_output can be called by programs execu
- CVE-2023-54171Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: tracing: Fix memory leak of iter->temp when reading trace_pipe kmemleak reports: unreferenced object 0xffff88814d14e200 (size 256): comm "cat", pid 336, jiffies 4294871818 (age 779.490s) hex dump (fir
- CVE-2023-54170Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: keys: Fix linking a duplicate key to a keyring's assoc_array When making a DNS query inside the kernel using dns_query(), the request code can in rare cases end up creating a duplicate index key in the assoc_ar
- CVE-2023-54168Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() The ucmd->log_sq_bb_count variable is controlled by the user so this shift can wrap. Fix it by using check_shl_overflow() in the same way that it was don
- CVE-2023-54166Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: igc: Fix Kernel Panic during ndo_tx_timeout callback The Xeon validation group has been carrying out some loaded tests with various HW configurations, and they have seen some transmit queue time out happening d
- CVE-2022-50889Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: dm integrity: Fix UAF in dm_integrity_dtr() Dm_integrity also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in dm_integrity_dtr().
- CVE-2022-50888Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: remoteproc: qcom: q6v5: Fix potential null-ptr-deref in q6v5_wcss_init_mmio() q6v5_wcss_init_mmio() will call platform_get_resource_byname() that may fail and return NULL. devm_ioremap() will use res->start as
- CVE-2022-50887Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix unbalanced of node refcount in regulator_dev_lookup() I got the the following report: OF: ERROR: memory leak, expected refcount 1 instead of 2, of_node_get()/of_node_put() unbalanced -
- CVE-2022-50886Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: mmc: toshsd: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash
- CVE-2022-50885Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when socket create failed There is a null-ptr-deref when mount.cifs over rdma: BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe] Rea
- CVE-2022-50884Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: drm: Prevent drm_copy_field() to attempt copying a NULL pointer There are some struct drm_driver fields that are required by drivers since drm_copy_field() attempts to copy them to user-space via DRM_IOCTL_VERS
- CVE-2022-50882Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix memory leak in uvc_gpio_parse Previously the unit buffer was allocated before checking the IRQ for privacy GPIO. In case of error, the unit buffer was leaked. Allocate the unit buffer afte
- CVE-2022-50881Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() This patch fixes a use-after-free in ath9k that occurs in ath9k_hif_usb_disconnect() when ath9k_destroy_wmi() is trying to access 'drv_priv' that ha
- CVE-2022-50880Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() When peer delete failed in a disconnect operation, use-after-free detected by KFENCE in below log. It is because for each vdev_id and ad
- CVE-2022-50878Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init() A NULL check for bridge->encoder shows that it may be NULL, but it already been dereferenced on all paths leading to the check. 812 i
- CVE-2022-50876Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: usb: musb: Fix musb_gadget.c rxstate overflow bug The usb function device call musb_gadget_queue() adds the passed request to musb_ep::req_list,If the (request->length > musb_ep->packet_sz) and (is_buffer_mappe
- CVE-2022-50872Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: ARM: OMAP2+: Fix memory leak in realtime_counter_init() The "sys_clk" resource is malloced by clk_get(), it is not released when the function return.
- CVE-2022-50870Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid device tree lookups in rtas_os_term() rtas_os_term() is called during panic. Its behavior depends on a couple of conditions in the /rtas node of the device tree, the traversal of which entai
- CVE-2022-50868Dec 30, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: hwrng: amd - Fix PCI device refcount leak for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the returned pci_dev and also
Page 5 of 148