rpm package
suse/kernel-source&distro=SUSE Manager Server 4.3
pkg:rpm/suse/kernel-source&distro=SUSE%20Manager%20Server%204.3
Vulnerabilities (1,907)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-50034 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: usb: cdns3 fix use-after-free at workaround 2 BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xac cdns3_wa2_remove_old_request() { ... kfree(priv_req->request.buf); cdns3_gadget_ep_free_req | ||
| CVE-2022-50033 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: usb: host: ohci-ppc-of: Fix refcount leak bug In ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore. | ||
| CVE-2022-50032 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: usb: renesas: Fix refcount leak bug In usbhs_rza1_hardware_init(), of_find_node_by_name() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore. | ||
| CVE-2022-50030 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input Malformed user input to debugfs results in buffer overflow crashes. Adapt input string lengths to fit within internal buffers, l | ||
| CVE-2022-50029 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: clk: qcom: ipq8074: dont disable gcc_sleep_clk_src Once the usb sleep clocks are disabled, clock framework is trying to disable the sleep clock source also. However, it seems that it cannot be disabled and try | ||
| CVE-2022-50028 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: gadgetfs: ep_io - wait until IRQ finishes after usb_ep_queue() if wait_for_completion_interruptible() is interrupted we need to wait until IRQ gets finished. Otherwise complete() from epio_complete() can corru | ||
| CVE-2022-50027 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE There is no corresponding free routine if lpfc_sli4_issue_wqe fails to issue the CMF WQE in lpfc_issue_cmf_sync_wqe. If ret_val is non-zero, t | ||
| CVE-2022-50026 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: habanalabs/gaudi: fix shift out of bounds When validating NIC queues, queue offset calculation must be performed only for NIC queues. | ||
| CVE-2022-50024 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: do not print NULL LLI during error During debugging we have seen an issue where axi_chan_dump_lli() is passed a NULL LLI pointer which ends up causing an OOPS due to trying to get fields | ||
| CVE-2022-50023 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: ignore interrupt if no descriptor If the channel has no descriptor and the interrupt is raised then the kernel will OOPS. Check the result of vchan_next_desc() in the handler axi_chan_bl | ||
| CVE-2022-50022 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: drivers:md:fix a potential use-after-free bug In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and may cause sh to be released. However, sh is subsequently used in lines 2886 "if (sh->batch_h | ||
| CVE-2022-50021 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: ext4: block range must be validated before use in ext4_mb_clear_bb() Block range to free is validated in ext4_free_blocks() using ext4_inode_block_valid() and then it's passed to ext4_mb_clear_bb(). However in | ||
| CVE-2022-50020 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: ext4: avoid resizing to a partial cluster size This patch avoids an attempt to resize the filesystem to an unaligned cluster boundary. An online resize to a size that is not integral to cluster size results in | ||
| CVE-2022-50019 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: tty: serial: Fix refcount leak bug in ucc_uart.c In soc_info(), of_find_node_by_type() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore. | ||
| CVE-2022-50012 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: powerpc/64: Init jump labels before parse_early_param() On 64-bit, calling jump_label_init() in setup_feature_keys() is too late because static keys may be used in subroutines of parse_early_param() which is ag | ||
| CVE-2022-50011 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: venus: pm_helpers: Fix warning in OPP during probe Fix the following WARN triggered during Venus driver probe on 5.19.0-rc8-next-20220728: WARNING: CPU: 7 PID: 339 at drivers/opp/core.c:2471 dev_pm_opp_set_co | ||
| CVE-2022-50010 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: video: fbdev: i740fb: Check the argument of i740_calc_vclk() Since the user can control the arguments of the ioctl() from the user space, under special arguments that may result in a divide-by-zero bug. If the | ||
| CVE-2022-50008 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: kprobes: don't call disarm_kprobe() for disabled kprobes The assumption in __disable_kprobe() is wrong, and it could try to disarm an already disarmed kprobe and fire the WARN_ONCE() below. [0] We can easily r | ||
| CVE-2022-50006 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: NFSv4.2 fix problems with __nfs42_ssc_open A destination server while doing a COPY shouldn't accept using the passed in filehandle if its not a regular filehandle. If alloc_file_pseudo() has failed, we need to | ||
| CVE-2022-50005 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Jun 18, 2025 | In the Linux kernel, the following vulnerability has been resolved: nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout When the pn532 uart device is detaching, the pn532_uart_remove() is called. But there are no functions in pn532_uart_remove() that could delete th |
- CVE-2022-50034Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: usb: cdns3 fix use-after-free at workaround 2 BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xac cdns3_wa2_remove_old_request() { ... kfree(priv_req->request.buf); cdns3_gadget_ep_free_req
- CVE-2022-50033Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: usb: host: ohci-ppc-of: Fix refcount leak bug In ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore.
- CVE-2022-50032Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: usb: renesas: Fix refcount leak bug In usbhs_rza1_hardware_init(), of_find_node_by_name() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore.
- CVE-2022-50030Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input Malformed user input to debugfs results in buffer overflow crashes. Adapt input string lengths to fit within internal buffers, l
- CVE-2022-50029Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: clk: qcom: ipq8074: dont disable gcc_sleep_clk_src Once the usb sleep clocks are disabled, clock framework is trying to disable the sleep clock source also. However, it seems that it cannot be disabled and try
- CVE-2022-50028Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: gadgetfs: ep_io - wait until IRQ finishes after usb_ep_queue() if wait_for_completion_interruptible() is interrupted we need to wait until IRQ gets finished. Otherwise complete() from epio_complete() can corru
- CVE-2022-50027Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE There is no corresponding free routine if lpfc_sli4_issue_wqe fails to issue the CMF WQE in lpfc_issue_cmf_sync_wqe. If ret_val is non-zero, t
- CVE-2022-50026Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: habanalabs/gaudi: fix shift out of bounds When validating NIC queues, queue offset calculation must be performed only for NIC queues.
- CVE-2022-50024Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: do not print NULL LLI during error During debugging we have seen an issue where axi_chan_dump_lli() is passed a NULL LLI pointer which ends up causing an OOPS due to trying to get fields
- CVE-2022-50023Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: ignore interrupt if no descriptor If the channel has no descriptor and the interrupt is raised then the kernel will OOPS. Check the result of vchan_next_desc() in the handler axi_chan_bl
- CVE-2022-50022Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: drivers:md:fix a potential use-after-free bug In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and may cause sh to be released. However, sh is subsequently used in lines 2886 "if (sh->batch_h
- CVE-2022-50021Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: ext4: block range must be validated before use in ext4_mb_clear_bb() Block range to free is validated in ext4_free_blocks() using ext4_inode_block_valid() and then it's passed to ext4_mb_clear_bb(). However in
- CVE-2022-50020Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid resizing to a partial cluster size This patch avoids an attempt to resize the filesystem to an unaligned cluster boundary. An online resize to a size that is not integral to cluster size results in
- CVE-2022-50019Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: tty: serial: Fix refcount leak bug in ucc_uart.c In soc_info(), of_find_node_by_type() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore.
- CVE-2022-50012Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: powerpc/64: Init jump labels before parse_early_param() On 64-bit, calling jump_label_init() in setup_feature_keys() is too late because static keys may be used in subroutines of parse_early_param() which is ag
- CVE-2022-50011Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: venus: pm_helpers: Fix warning in OPP during probe Fix the following WARN triggered during Venus driver probe on 5.19.0-rc8-next-20220728: WARNING: CPU: 7 PID: 339 at drivers/opp/core.c:2471 dev_pm_opp_set_co
- CVE-2022-50010Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: i740fb: Check the argument of i740_calc_vclk() Since the user can control the arguments of the ioctl() from the user space, under special arguments that may result in a divide-by-zero bug. If the
- CVE-2022-50008Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: kprobes: don't call disarm_kprobe() for disabled kprobes The assumption in __disable_kprobe() is wrong, and it could try to disarm an already disarmed kprobe and fire the WARN_ONCE() below. [0] We can easily r
- CVE-2022-50006Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: NFSv4.2 fix problems with __nfs42_ssc_open A destination server while doing a COPY shouldn't accept using the passed in filehandle if its not a regular filehandle. If alloc_file_pseudo() has failed, we need to
- CVE-2022-50005Jun 18, 2025affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout When the pn532 uart device is detaching, the pn532_uart_remove() is called. But there are no functions in pn532_uart_remove() that could delete th
Page 7 of 96