rpm package
suse/kernel-source&distro=SUSE Linux Enterprise Server 15 SP3-LTSS
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS
Vulnerabilities (1,483)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-38120 | — | < 5.3.18-150300.59.215.1 | 5.3.18-150300.59.215.1 | Jul 3, 2025 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_set_pipapo_avx2: fix initial map fill If the first field doesn't cover the entire start map, then we must zero out the remainder, else we leak those bits into the next match round map. The early | ||
| CVE-2025-38083 | Med | 4.7 | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 20, 2025 | In the Linux kernel, the following vulnerability has been resolved: net_sched: prio: fix a race in prio_tune() Gerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer fires at the wrong time. The race is as follows: CPU 0 CPU | |
| CVE-2022-50231 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: crypto: arm64/poly1305 - fix a read out-of-bound A kasan error was reported during fuzzing: BUG: KASAN: slab-out-of-bounds in neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon] Read of size 4 at addr | ||
| CVE-2022-50229 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: ALSA: bcd2000: Fix a UAF bug on the error path of probing When the driver fails in snd_card_register() at probe time, it will free the 'bcd2k->midi_out_urb' before killing it, which may cause a UAF bug. The fo | ||
| CVE-2022-50222 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: tty: vt: initialize unicode screen buffer syzbot reports kernel infoleak at vcs_read() [1], for buffer can be read immediately after resize operation. Initialize buffer using kzalloc(). ---------- #include | ||
| CVE-2022-50220 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: usbnet: Fix linkwatch use-after-free on disconnect usbnet uses the work usbnet_deferred_kevent() to perform tasks which may sleep. On disconnect, completion of the work was originally awaited in ->ndo_stop(). | ||
| CVE-2022-50218 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: iio: light: isl29028: Fix the warning in isl29028_remove() The driver use the non-managed form of the register function in isl29028_remove(). To keep the release order as mirroring the ordering in probe, the dr | ||
| CVE-2022-50215 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Allow waiting for commands to complete on removed device When a SCSI device is removed while in active use, currently sg will immediately return -ENODEV on any attempt to wait for active commands that | ||
| CVE-2022-50213 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not allow SET_ID to refer to another table When doing lookups for sets on the same batch by using its ID, a set from a different table can be used. Then, when the table is removed, a r | ||
| CVE-2022-50212 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not allow CHAIN_ID to refer to another table When doing lookups for chains on the same batch by using its ID, a chain from a different table can be used. If a rule is added to a table b | ||
| CVE-2022-50211 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: md-raid10: fix KASAN warning There's a KASAN warning in raid10_remove_disk when running the lvm test lvconvert-raid-reshape.sh. We fix this warning by verifying that the value "number" is valid. BUG: KASAN: sl | ||
| CVE-2022-50209 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_nod | ||
| CVE-2022-50200 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: selinux: Add boundary check in put_entry() Just like next_entry(), boundary check is necessary to prevent memory out-of-bound access. | ||
| CVE-2022-50191 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: regulator: of: Fix refcount leak bug in of_get_regulation_constraints() We should call the of_node_put() for the reference returned by of_get_child_by_name() which has increased the refcount. | ||
| CVE-2022-50185 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() The last case label can write two buffers 'mc_reg_address[j]' and 'mc_data[j]' with 'j' offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_ | ||
| CVE-2022-50181 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: virtio-gpu: fix a missing check to avoid NULL dereference 'cache_ent' could be set NULL inside virtio_gpu_cmd_get_capset() and it will lead to a NULL dereference by a lately use of it (i.e., ptr = cache_ent->ca | ||
| CVE-2022-50179 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: ath9k: fix use-after-free in ath9k_hif_usb_rx_cb Syzbot reported use-after-free Read in ath9k_hif_usb_rx_cb() [0]. The problem was in incorrect htc_handle->drv_priv initialization. Probable call trace which ca | ||
| CVE-2022-50176 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/mcde: Fix refcount leak in mcde_dsi_bind Every iteration of for_each_available_child_of_node() decrements the reference counter of the previous node. There is no decrement when break out from the loop and r | ||
| CVE-2022-50173 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/msm/mdp5: Fix global state lock backoff We need to grab the lock after the early return for !hwpipe case. Otherwise, we could have hit contention yet still returned 0. Fixes an issue that the new CONFIG_DR | ||
| CVE-2022-50172 | — | < 5.3.18-150300.59.211.1 | 5.3.18-150300.59.211.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg Free the skb if mt76u_bulk_msg fails in __mt76x02u_mcu_send_msg routine. |
- CVE-2025-38120Jul 3, 2025affected < 5.3.18-150300.59.215.1fixed 5.3.18-150300.59.215.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_set_pipapo_avx2: fix initial map fill If the first field doesn't cover the entire start map, then we must zero out the remainder, else we leak those bits into the next match round map. The early
- affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: net_sched: prio: fix a race in prio_tune() Gerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer fires at the wrong time. The race is as follows: CPU 0 CPU
- CVE-2022-50231Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: crypto: arm64/poly1305 - fix a read out-of-bound A kasan error was reported during fuzzing: BUG: KASAN: slab-out-of-bounds in neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon] Read of size 4 at addr
- CVE-2022-50229Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: ALSA: bcd2000: Fix a UAF bug on the error path of probing When the driver fails in snd_card_register() at probe time, it will free the 'bcd2k->midi_out_urb' before killing it, which may cause a UAF bug. The fo
- CVE-2022-50222Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: tty: vt: initialize unicode screen buffer syzbot reports kernel infoleak at vcs_read() [1], for buffer can be read immediately after resize operation. Initialize buffer using kzalloc(). ---------- #include
- CVE-2022-50220Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: usbnet: Fix linkwatch use-after-free on disconnect usbnet uses the work usbnet_deferred_kevent() to perform tasks which may sleep. On disconnect, completion of the work was originally awaited in ->ndo_stop().
- CVE-2022-50218Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: iio: light: isl29028: Fix the warning in isl29028_remove() The driver use the non-managed form of the register function in isl29028_remove(). To keep the release order as mirroring the ordering in probe, the dr
- CVE-2022-50215Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Allow waiting for commands to complete on removed device When a SCSI device is removed while in active use, currently sg will immediately return -ENODEV on any attempt to wait for active commands that
- CVE-2022-50213Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not allow SET_ID to refer to another table When doing lookups for sets on the same batch by using its ID, a set from a different table can be used. Then, when the table is removed, a r
- CVE-2022-50212Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not allow CHAIN_ID to refer to another table When doing lookups for chains on the same batch by using its ID, a chain from a different table can be used. If a rule is added to a table b
- CVE-2022-50211Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: md-raid10: fix KASAN warning There's a KASAN warning in raid10_remove_disk when running the lvm test lvconvert-raid-reshape.sh. We fix this warning by verifying that the value "number" is valid. BUG: KASAN: sl
- CVE-2022-50209Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_nod
- CVE-2022-50200Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: selinux: Add boundary check in put_entry() Just like next_entry(), boundary check is necessary to prevent memory out-of-bound access.
- CVE-2022-50191Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: regulator: of: Fix refcount leak bug in of_get_regulation_constraints() We should call the of_node_put() for the reference returned by of_get_child_by_name() which has increased the refcount.
- CVE-2022-50185Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() The last case label can write two buffers 'mc_reg_address[j]' and 'mc_data[j]' with 'j' offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_
- CVE-2022-50181Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: virtio-gpu: fix a missing check to avoid NULL dereference 'cache_ent' could be set NULL inside virtio_gpu_cmd_get_capset() and it will lead to a NULL dereference by a lately use of it (i.e., ptr = cache_ent->ca
- CVE-2022-50179Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: ath9k: fix use-after-free in ath9k_hif_usb_rx_cb Syzbot reported use-after-free Read in ath9k_hif_usb_rx_cb() [0]. The problem was in incorrect htc_handle->drv_priv initialization. Probable call trace which ca
- CVE-2022-50176Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: drm/mcde: Fix refcount leak in mcde_dsi_bind Every iteration of for_each_available_child_of_node() decrements the reference counter of the previous node. There is no decrement when break out from the loop and r
- CVE-2022-50173Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: drm/msm/mdp5: Fix global state lock backoff We need to grab the lock after the early return for !hwpipe case. Otherwise, we could have hit contention yet still returned 0. Fixes an issue that the new CONFIG_DR
- CVE-2022-50172Jun 18, 2025affected < 5.3.18-150300.59.211.1fixed 5.3.18-150300.59.211.1
In the Linux kernel, the following vulnerability has been resolved: mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg Free the skb if mt76u_bulk_msg fails in __mt76x02u_mcu_send_msg routine.
Page 8 of 75