rpm package
suse/kernel-source-rt&distro=SUSE Linux Enterprise Micro 5.3
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3
Vulnerabilities (2,793)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-54014 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() Klocwork reported warning of rport maybe NULL and will be dereferenced. rport returned by call to fc_bsg_to_rport() could be NULL and dereferenced. | ||
| CVE-2023-54010 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects ACPICA commit 0d5f467d6a0ba852ea3aad68663cbcbd43300fd4 ACPI_ALLOCATE_ZEROED may fails, object_info might be null and will ca | ||
| CVE-2023-54009 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path The cdns_i2c_master_xfer() function gets a runtime PM reference when the function is entered. This reference is released when the function | ||
| CVE-2023-54007 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: vmci_host: fix a race condition in vmci_host_poll() causing GPF During fuzzing, a general protection fault is observed in vmci_host_poll(). general protection fault, probably for non-canonical address 0xdffffc | ||
| CVE-2023-54003 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix GID entry ref leak when create_ah fails If AH create request fails, release sgid_attr to avoid GID entry referrence leak reported while releasing GID table | ||
| CVE-2023-54001 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: staging: r8712: Fix memory leak in _r8712_init_xmit_priv() In the above mentioned routine, memory is allocated in several places. If the first succeeds and a later one fails, the routine will leak memory. This | ||
| CVE-2023-53998 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: hwrng: virtio - Fix race on data_avail and actual data The virtio rng device kicks off a new entropy request whenever the data available reaches zero. When a new request occurs at the end of a read operation, | ||
| CVE-2023-53996 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: x86/sev: Make enc_dec_hypercall() accept a size instead of npages enc_dec_hypercall() accepted a page count instead of a size, which forced its callers to round up. As a result, non-page aligned vaddrs caused p | ||
| CVE-2023-53991 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Disallow unallocated resources to be returned In the event that the topology requests resources that have not been created by the system (because they are typically not represented in dpu_mdss_cfg | ||
| CVE-2023-53990 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: SMB3: Add missing locks to protect deferred close file list cifs_del_deferred_close function has a critical section which modifies the deferred close file list. We must acquire deferred_lock before calling cifs | ||
| CVE-2022-50709 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() syzbot is reporting uninit value at ath9k_htc_rx_msg() [1], for ioctl(USB_RAW_IOCTL_EP_WRITE) can call ath9k_hif_usb_rx_stream() with pkt_len = 0 but | ||
| CVE-2022-50704 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: USB: gadget: Fix use-after-free during usb config switch In the process of switching USB config from rndis to other config, if the hardware does not support the ->pullup callback, or the hardware encounters a l | ||
| CVE-2022-50703 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() There are two refcount leak bugs in qcom_smsm_probe(): (1) The 'local_node' is escaped out from for_each_child_of_node() as the break of iteration, | ||
| CVE-2022-50702 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: vdpa_sim: fix possible memory leak in vdpasim_net_init() and vdpasim_blk_init() Inject fault while probing module, if device_register() fails in vdpasim_net_init() or vdpasim_blk_init(), but the refcount of kob | ||
| CVE-2022-50700 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: Delay the unmapping of the buffer On WCN3990, we are seeing a rare scenario where copy engine hardware is sending a copy complete interrupt to the host driver while still processing the buffer tha | ||
| CVE-2022-50699 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() The following warning was triggered on a hardware environment: SELinux: Converting 162 SID table entries... BUG: sleeping function | ||
| CVE-2022-50698 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() If clk_hw_register() fails, the corresponding clk should not be unregistered. To handle errors from loops, clean up partial iterations bef | ||
| CVE-2022-50697 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: mrp: introduce active flags to prevent UAF when applicant uninit The caller of del_timer_sync must prevent restarting of the timer, If we have no this synchronization, there is a small probability that the canc | ||
| CVE-2025-68312 | — | < 5.14.21-150400.15.145.1 | 5.14.21-150400.15.145.1 | Dec 16, 2025 | In the Linux kernel, the following vulnerability has been resolved: usbnet: Prevents free active kevent The root cause of this issue are: 1. When probing the usbnet device, executing usbnet_link_change(dev, 0, 0); put the kevent work in global workqueue. However, the kevent has | ||
| CVE-2025-68285 | — | < 5.14.21-150400.15.142.1 | 5.14.21-150400.15.142.1 | Dec 16, 2025 | In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both |
- CVE-2023-54014Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() Klocwork reported warning of rport maybe NULL and will be dereferenced. rport returned by call to fc_bsg_to_rport() could be NULL and dereferenced.
- CVE-2023-54010Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects ACPICA commit 0d5f467d6a0ba852ea3aad68663cbcbd43300fd4 ACPI_ALLOCATE_ZEROED may fails, object_info might be null and will ca
- CVE-2023-54009Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path The cdns_i2c_master_xfer() function gets a runtime PM reference when the function is entered. This reference is released when the function
- CVE-2023-54007Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: vmci_host: fix a race condition in vmci_host_poll() causing GPF During fuzzing, a general protection fault is observed in vmci_host_poll(). general protection fault, probably for non-canonical address 0xdffffc
- CVE-2023-54003Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix GID entry ref leak when create_ah fails If AH create request fails, release sgid_attr to avoid GID entry referrence leak reported while releasing GID table
- CVE-2023-54001Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: staging: r8712: Fix memory leak in _r8712_init_xmit_priv() In the above mentioned routine, memory is allocated in several places. If the first succeeds and a later one fails, the routine will leak memory. This
- CVE-2023-53998Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: hwrng: virtio - Fix race on data_avail and actual data The virtio rng device kicks off a new entropy request whenever the data available reaches zero. When a new request occurs at the end of a read operation,
- CVE-2023-53996Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: x86/sev: Make enc_dec_hypercall() accept a size instead of npages enc_dec_hypercall() accepted a page count instead of a size, which forced its callers to round up. As a result, non-page aligned vaddrs caused p
- CVE-2023-53991Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Disallow unallocated resources to be returned In the event that the topology requests resources that have not been created by the system (because they are typically not represented in dpu_mdss_cfg
- CVE-2023-53990Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: SMB3: Add missing locks to protect deferred close file list cifs_del_deferred_close function has a critical section which modifies the deferred close file list. We must acquire deferred_lock before calling cifs
- CVE-2022-50709Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() syzbot is reporting uninit value at ath9k_htc_rx_msg() [1], for ioctl(USB_RAW_IOCTL_EP_WRITE) can call ath9k_hif_usb_rx_stream() with pkt_len = 0 but
- CVE-2022-50704Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: USB: gadget: Fix use-after-free during usb config switch In the process of switching USB config from rndis to other config, if the hardware does not support the ->pullup callback, or the hardware encounters a l
- CVE-2022-50703Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() There are two refcount leak bugs in qcom_smsm_probe(): (1) The 'local_node' is escaped out from for_each_child_of_node() as the break of iteration,
- CVE-2022-50702Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: vdpa_sim: fix possible memory leak in vdpasim_net_init() and vdpasim_blk_init() Inject fault while probing module, if device_register() fails in vdpasim_net_init() or vdpasim_blk_init(), but the refcount of kob
- CVE-2022-50700Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: Delay the unmapping of the buffer On WCN3990, we are seeing a rare scenario where copy engine hardware is sending a copy complete interrupt to the host driver while still processing the buffer tha
- CVE-2022-50699Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() The following warning was triggered on a hardware environment: SELinux: Converting 162 SID table entries... BUG: sleeping function
- CVE-2022-50698Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() If clk_hw_register() fails, the corresponding clk should not be unregistered. To handle errors from loops, clean up partial iterations bef
- CVE-2022-50697Dec 24, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: mrp: introduce active flags to prevent UAF when applicant uninit The caller of del_timer_sync must prevent restarting of the timer, If we have no this synchronization, there is a small probability that the canc
- CVE-2025-68312Dec 16, 2025affected < 5.14.21-150400.15.145.1fixed 5.14.21-150400.15.145.1
In the Linux kernel, the following vulnerability has been resolved: usbnet: Prevents free active kevent The root cause of this issue are: 1. When probing the usbnet device, executing usbnet_link_change(dev, 0, 0); put the kevent work in global workqueue. However, the kevent has
- CVE-2025-68285Dec 16, 2025affected < 5.14.21-150400.15.142.1fixed 5.14.21-150400.15.142.1
In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both
Page 13 of 140