VYPR

rpm package

suse/kernel-source-rt&distro=SUSE Linux Enterprise Micro 5.2

pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Vulnerabilities (1,394)

  • CVE-2025-68813Jan 13, 2026
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: ipvs: fix ipv4 null-ptr-deref in route error path The IPv4 code path in __ip_vs_get_out_rt() calls dst_link_failure() without ensuring skb->dev is set, leading to a NULL pointer dereference in fib_compute_spec_

  • CVE-2025-71085Jan 13, 2026
    affected < 5.3.18-150300.235.1fixed 5.3.18-150300.235.1

    In the Linux kernel, the following vulnerability has been resolved: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() There exists a kernel oops caused by a BUG_ON(nhead < 0) at net/core/skbuff.c:2232 in pskb_expand_head(). This bug is triggered as part of t

  • CVE-2023-54270Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: media: usb: siano: Fix use after free bugs caused by do_submit_urb There are UAF bugs caused by do_submit_urb(). One of the KASan reports is shown below: [ 36.403605] BUG: KASAN: use-after-free in worker_thr

  • CVE-2023-54243Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: netfilter: ebtables: fix table blob use-after-free We are not allowed to return an error at this point. Looking at the code it looks like ret is always 0 at this point, but its not. t = find_table_lock(net, re

  • CVE-2023-54242Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: block, bfq: Fix division by zero error on zero wsum When the weighted sum is zero the calculation of limit causes a division by zero error. Fix this by continuing to the next level. This was discovered by runn

  • CVE-2023-54170Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: keys: Fix linking a duplicate key to a keyring's assoc_array When making a DNS query inside the kernel using dns_query(), the request code can in rare cases end up creating a duplicate index key in the assoc_ar

  • CVE-2023-54168Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() The ucmd->log_sq_bb_count variable is controlled by the user so this shift can wrap. Fix it by using check_shl_overflow() in the same way that it was don

  • CVE-2022-50889Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: dm integrity: Fix UAF in dm_integrity_dtr() Dm_integrity also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in dm_integrity_dtr().

  • CVE-2022-50884Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: drm: Prevent drm_copy_field() to attempt copying a NULL pointer There are some struct drm_driver fields that are required by drivers since drm_copy_field() attempts to copy them to user-space via DRM_IOCTL_VERS

  • CVE-2022-50880Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() When peer delete failed in a disconnect operation, use-after-free detected by KFENCE in below log. It is because for each vdev_id and ad

  • CVE-2022-50876Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: usb: musb: Fix musb_gadget.c rxstate overflow bug The usb function device call musb_gadget_queue() adds the passed request to musb_ep::req_list,If the (request->length > musb_ep->packet_sz) and (is_buffer_mappe

  • CVE-2022-50870Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid device tree lookups in rtas_os_term() rtas_os_term() is called during panic. Its behavior depends on a couple of conditions in the /rtas node of the device tree, the traversal of which entai

  • CVE-2022-50850Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: ipr: Fix WARNING in ipr_init() ipr_init() will not call unregister_reboot_notifier() when pci_register_driver() fails, which causes a WARNING. Call unregister_reboot_notifier() when pci_register_driver()

  • CVE-2022-50843Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: dm clone: Fix UAF in clone_dtr() Dm_clone also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in clone_dtr().

  • CVE-2022-50840Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: snic: Fix possible UAF in snic_tgt_create() Smatch reports a warning as follows: drivers/scsi/snic/snic_disc.c:307 snic_tgt_create() warn: '&tgt->list' not removed from list If device_add() fails in s

  • CVE-2022-50828Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: clk: zynqmp: Fix stack-out-of-bounds in strncpy` "BUG: KASAN: stack-out-of-bounds in strncpy+0x30/0x68" Linux-ATF interface is using 16 bytes of SMC payload. In case clock name is longer than 15 bytes, string

  • CVE-2022-50827Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix memory leak in lpfc_create_port() Commit 5e633302ace1 ("scsi: lpfc: vmid: Add support for VMID in mailbox command") introduced allocations for the VMID resources in lpfc_create_port() after the

  • CVE-2022-50823Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: clk: tegra: Fix refcount leak in tegra114_clock_init of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put()

  • CVE-2022-50821Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails

  • CVE-2022-50814Dec 30, 2025
    affected < 5.3.18-150300.232.1fixed 5.3.18-150300.232.1

    In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr KASAN reported this Bug: [17619.659757] BUG: KASAN: global-out-of-bounds in param_get_int+0x34/0x60 [17619.673193] Read of size 4 at addr fffff01332

Page 2 of 70