rpm package
suse/kernel-source-rt&distro=SUSE Linux Enterprise Micro 5.3
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3
Vulnerabilities (2,793)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-50504 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid scheduling in rtas_os_term() It's unsafe to use rtas_busy_delay() to handle a busy status from the ibm,os-term RTAS function in rtas_os_term(): Kernel panic - not syncing: Attempted to kill | ||
| CVE-2022-50503 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: mtd: lpddr2_nvm: Fix possible null-ptr-deref It will cause null-ptr-deref when resource_size(add_range) invoked, if platform_get_resource() returns NULL. | ||
| CVE-2022-50501 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for dcoda_iram_alloc As the coda_iram_alloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others. | ||
| CVE-2022-50499 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: media: dvb-core: Fix double free in dvb_register_device() In function dvb_register_device() -> dvb_register_media_device() -> dvb_create_media_entity(), dvb->entity is allocated and initialized. If the initiali | ||
| CVE-2022-50498 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: eth: alx: take rtnl_lock on resume Zbynek reports that alx trips an rtnl assertion on resume: RTNL: assertion failed at net/core/dev.c (2891) RIP: 0010:netif_set_real_num_tx_queues+0x1ac/0x1c0 Call Trace: | ||
| CVE-2022-50497 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: binfmt_misc: fix shift-out-of-bounds in check_special_flags UBSAN reported a shift-out-of-bounds warning: left shift of 1 by 31 places cannot be represented in type 'int' Call Trace: __dump_stack | ||
| CVE-2022-50496 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: dm cache: Fix UAF in destroy() Dm_cache also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in destroy(). | ||
| CVE-2022-50494 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash When CPU 0 is offline and intel_powerclamp is used to inject idle, it generates kernel BUG: BUG: using smp_processor_id() i | ||
| CVE-2022-50493 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix crash when I/O abort times out While performing CPU hotplug, a crash with the following stack was seen: Call Trace: qla24xx_process_response_queue+0x42a/0x970 [qla2xxx] qla2x00_sta | ||
| CVE-2022-50492 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix use-after-free on probe deferral The bridge counter was never reset when tearing down the DRM device so that stale pointers to deallocated structures would be accessed on the next tear down (e.g. a | ||
| CVE-2022-50490 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elem | ||
| CVE-2022-50489 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/mipi-dsi: Detach devices when removing the host Whenever the MIPI-DSI host is unregistered, the code of mipi_dsi_host_unregister() loops over every device currently found on that bus and will unregister it. | ||
| CVE-2022-50488 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix possible uaf for 'bfqq->bic' Our test report a uaf for 'bfqq->bic' in 5.10: ================================================================== BUG: KASAN: use-after-free in bfq_select_queue+0x3 | ||
| CVE-2023-53579 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: gpio: mvebu: fix irq domain leak Uwe Kleine-König pointed out we still have one resource leak in the mvebu driver triggered on driver detach. Let's address it with a custom devm action. | ||
| CVE-2023-53576 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: null_blk: Always check queue mode setting from configfs Make sure to check device queue mode in the null_validate_conf() and return error for NULL_Q_RQ as we don't allow legacy I/O path, without this patch we g | ||
| CVE-2023-53574 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: delete timer and free skb queue when unloading Fix possible crash and memory leak on driver unload by deleting TX purge timer and freeing C2H queue in 'rtw_core_deinit()', shrink critical section i | ||
| CVE-2023-53572 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: use _safe list iterator to avoid a use after free This loop is freeing "clk" so it needs to use list_for_each_entry_safe(). Otherwise it dereferences a freed variable to get the next item on the | ||
| CVE-2023-53571 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/i915: Make intel_get_crtc_new_encoder() less oopsy The point of the WARN was to print something, not oops straight up. Currently that is precisely what happens if we can't find the connector for the crtc in | ||
| CVE-2023-53568 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: don't leak memory if dev_set_name() fails When dev_set_name() fails, zcdn_create() doesn't free the newly allocated resources. Do it. | ||
| CVE-2023-53567 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 4, 2025 | In the Linux kernel, the following vulnerability has been resolved: spi: qup: Don't skip cleanup in remove's error path Returning early in a platform driver's remove callback is wrong. In this case the dma resources are not released in the error path. this is never retried late |
- CVE-2022-50504Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid scheduling in rtas_os_term() It's unsafe to use rtas_busy_delay() to handle a busy status from the ibm,os-term RTAS function in rtas_os_term(): Kernel panic - not syncing: Attempted to kill
- CVE-2022-50503Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: mtd: lpddr2_nvm: Fix possible null-ptr-deref It will cause null-ptr-deref when resource_size(add_range) invoked, if platform_get_resource() returns NULL.
- CVE-2022-50501Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for dcoda_iram_alloc As the coda_iram_alloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others.
- CVE-2022-50499Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: media: dvb-core: Fix double free in dvb_register_device() In function dvb_register_device() -> dvb_register_media_device() -> dvb_create_media_entity(), dvb->entity is allocated and initialized. If the initiali
- CVE-2022-50498Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: eth: alx: take rtnl_lock on resume Zbynek reports that alx trips an rtnl assertion on resume: RTNL: assertion failed at net/core/dev.c (2891) RIP: 0010:netif_set_real_num_tx_queues+0x1ac/0x1c0 Call Trace:
- CVE-2022-50497Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: binfmt_misc: fix shift-out-of-bounds in check_special_flags UBSAN reported a shift-out-of-bounds warning: left shift of 1 by 31 places cannot be represented in type 'int' Call Trace: __dump_stack
- CVE-2022-50496Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: dm cache: Fix UAF in destroy() Dm_cache also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in destroy().
- CVE-2022-50494Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash When CPU 0 is offline and intel_powerclamp is used to inject idle, it generates kernel BUG: BUG: using smp_processor_id() i
- CVE-2022-50493Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix crash when I/O abort times out While performing CPU hotplug, a crash with the following stack was seen: Call Trace: qla24xx_process_response_queue+0x42a/0x970 [qla2xxx] qla2x00_sta
- CVE-2022-50492Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix use-after-free on probe deferral The bridge counter was never reset when tearing down the DRM device so that stale pointers to deallocated structures would be accessed on the next tear down (e.g. a
- CVE-2022-50490Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elem
- CVE-2022-50489Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: drm/mipi-dsi: Detach devices when removing the host Whenever the MIPI-DSI host is unregistered, the code of mipi_dsi_host_unregister() loops over every device currently found on that bus and will unregister it.
- CVE-2022-50488Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix possible uaf for 'bfqq->bic' Our test report a uaf for 'bfqq->bic' in 5.10: ================================================================== BUG: KASAN: use-after-free in bfq_select_queue+0x3
- CVE-2023-53579Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: gpio: mvebu: fix irq domain leak Uwe Kleine-König pointed out we still have one resource leak in the mvebu driver triggered on driver detach. Let's address it with a custom devm action.
- CVE-2023-53576Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: null_blk: Always check queue mode setting from configfs Make sure to check device queue mode in the null_validate_conf() and return error for NULL_Q_RQ as we don't allow legacy I/O path, without this patch we g
- CVE-2023-53574Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: delete timer and free skb queue when unloading Fix possible crash and memory leak on driver unload by deleting TX purge timer and freeing C2H queue in 'rtw_core_deinit()', shrink critical section i
- CVE-2023-53572Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: use _safe list iterator to avoid a use after free This loop is freeing "clk" so it needs to use list_for_each_entry_safe(). Otherwise it dereferences a freed variable to get the next item on the
- CVE-2023-53571Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: drm/i915: Make intel_get_crtc_new_encoder() less oopsy The point of the WARN was to print something, not oops straight up. Currently that is precisely what happens if we can't find the connector for the crtc in
- CVE-2023-53568Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: don't leak memory if dev_set_name() fails When dev_set_name() fails, zcdn_create() doesn't free the newly allocated resources. Do it.
- CVE-2023-53567Oct 4, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: spi: qup: Don't skip cleanup in remove's error path Returning early in a platform driver's remove callback is wrong. In this case the dma resources are not released in the error path. this is never retried late
Page 25 of 140