rpm package
suse/kernel-source-rt&distro=SUSE Linux Enterprise Micro 5.3
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3
Vulnerabilities (2,793)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-53049 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: usb: ucsi: Fix NULL pointer deref in ucsi_connector_change() When ucsi_init() fails, ucsi->connector is NULL, yet in case of ucsi_acpi we may still get events which cause the ucs_acpi code to call ucsi_connecto | ||
| CVE-2023-53048 | — | < 5.14.21-150400.15.124.1 | 5.14.21-150400.15.124.1 | May 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: fix warning when handle discover_identity message Since both source and sink device can send discover_identity message in PD3, kernel may dump below warning: ------------[ cut here ]--------- | ||
| CVE-2023-53045 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_audio: don't let userspace block driver unbind In the unbind callback for f_uac1 and f_uac2, a call to snd_card_free() via g_audio_cleanup() will disconnect the card and then wait for all resourc | ||
| CVE-2023-53044 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: dm stats: check for and propagate alloc_percpu failure Check alloc_precpu()'s return value and return an error from dm_stats_init() if it fails. Update alloc_dev() to fail if dm_stats_init() does. Otherwise, a | ||
| CVE-2023-53041 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Perform lockless command completion in abort path While adding and removing the controller, the following call trace was observed: WARNING: CPU: 3 PID: 623596 at kernel/dma/mapping.c:532 dma_fre | ||
| CVE-2023-53040 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: ca8210: fix mac_len negative array access This patch fixes a buffer overflow access of skb->data if ieee802154_hdr_peek_addrs() fails. | ||
| CVE-2023-53039 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function When a reset notify IPC message is received, the ISR schedules a work function and passes the ISHTP device to it via a global pointer ishtp | ||
| CVE-2023-53038 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read() If kzalloc() fails in lpfc_sli4_cgn_params_read(), then we rely on lpfc_read_object()'s routine to NULL check pdata. Currently, an early return error | ||
| CVE-2023-53035 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() The ioctl helper function nilfs_ioctl_wrap_copy(), which exchanges a metadata array to/from user space, may copy uninitialized buffer regions to user space | ||
| CVE-2025-37798 | — | < 5.14.21-150400.15.124.1 | 5.14.21-150400.15.124.1 | May 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making all ->qlen_notify() callbacks idempotent, now it is safe to remove the check of qlen!=0 from both fq_codel_dequeue() and codel_qdi | ||
| CVE-2025-37797 | — | < 5.14.21-150400.15.124.1 | 5.14.21-150400.15.124.1 | May 2, 2025 | In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc | ||
| CVE-2022-49931 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Correctly move list in sc_disable() Commit 13bac861952a ("IB/hfi1: Fix abba locking issue with sc_disable()") incorrectly tries to move a list from one list head to another. The result is a kernel cra | ||
| CVE-2022-49928 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed There is a null-ptr-deref when xps sysfs alloc failed: BUG: KASAN: null-ptr-deref in sysfs_do_create_link_sd+0x40/0xd0 Read of size 8 at addr 000000000 | ||
| CVE-2022-49927 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: nfs4: Fix kmemleak when allocate slot failed If one of the slot allocate failed, should cleanup all the other allocated slots, otherwise, the allocated slots will leak: unreferenced object 0xffff8881115aa100 | ||
| CVE-2022-49925 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix null-ptr-deref in ib_core_cleanup() KASAN reported a null-ptr-deref error: KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f] CPU: 1 PID: 379 Hardware name: QEMU Standa | ||
| CVE-2022-49924 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: nfc: fdp: Fix potential memory leak in fdp_nci_send() fdp_nci_send() will call fdp_nci_i2c_write that will not free skb in the function. As a result, when fdp_nci_i2c_write() finished, the skb will memleak. fdp | ||
| CVE-2022-49923 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() nxp_nci_send() will call nxp_nci_i2c_write(), and only free skb when nxp_nci_i2c_write() failed. However, even if the nxp_nci_i2c_write() run succeeds, | ||
| CVE-2022-49922 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() nfcmrvl_i2c_nci_send() will be called by nfcmrvl_nci_send(), and skb should be freed in nfcmrvl_i2c_nci_send(). However, nfcmrvl_nci_send() will | ||
| CVE-2022-49916 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: rose: Fix NULL pointer dereference in rose_send_frame() The syzkaller reported an issue: KASAN: null-ptr-deref in range [0x0000000000000380-0x0000000000000387] CPU: 0 PID: 4069 Comm: kworker/0:15 Not tainted 6 | ||
| CVE-2022-49915 | — | < 5.14.21-150400.15.121.1 | 5.14.21-150400.15.121.1 | May 1, 2025 | In the Linux kernel, the following vulnerability has been resolved: mISDN: fix possible memory leak in mISDN_register_device() Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, add put_device() |
- CVE-2023-53049May 2, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: usb: ucsi: Fix NULL pointer deref in ucsi_connector_change() When ucsi_init() fails, ucsi->connector is NULL, yet in case of ucsi_acpi we may still get events which cause the ucs_acpi code to call ucsi_connecto
- CVE-2023-53048May 2, 2025affected < 5.14.21-150400.15.124.1fixed 5.14.21-150400.15.124.1
In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: fix warning when handle discover_identity message Since both source and sink device can send discover_identity message in PD3, kernel may dump below warning: ------------[ cut here ]---------
- CVE-2023-53045May 2, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_audio: don't let userspace block driver unbind In the unbind callback for f_uac1 and f_uac2, a call to snd_card_free() via g_audio_cleanup() will disconnect the card and then wait for all resourc
- CVE-2023-53044May 2, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: dm stats: check for and propagate alloc_percpu failure Check alloc_precpu()'s return value and return an error from dm_stats_init() if it fails. Update alloc_dev() to fail if dm_stats_init() does. Otherwise, a
- CVE-2023-53041May 2, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Perform lockless command completion in abort path While adding and removing the controller, the following call trace was observed: WARNING: CPU: 3 PID: 623596 at kernel/dma/mapping.c:532 dma_fre
- CVE-2023-53040May 2, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: ca8210: fix mac_len negative array access This patch fixes a buffer overflow access of skb->data if ieee802154_hdr_peek_addrs() fails.
- CVE-2023-53039May 2, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function When a reset notify IPC message is received, the ISR schedules a work function and passes the ISHTP device to it via a global pointer ishtp
- CVE-2023-53038May 2, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read() If kzalloc() fails in lpfc_sli4_cgn_params_read(), then we rely on lpfc_read_object()'s routine to NULL check pdata. Currently, an early return error
- CVE-2023-53035May 2, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() The ioctl helper function nilfs_ioctl_wrap_copy(), which exchanges a metadata array to/from user space, may copy uninitialized buffer regions to user space
- CVE-2025-37798May 2, 2025affected < 5.14.21-150400.15.124.1fixed 5.14.21-150400.15.124.1
In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making all ->qlen_notify() callbacks idempotent, now it is safe to remove the check of qlen!=0 from both fq_codel_dequeue() and codel_qdi
- CVE-2025-37797May 2, 2025affected < 5.14.21-150400.15.124.1fixed 5.14.21-150400.15.124.1
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc
- CVE-2022-49931May 1, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Correctly move list in sc_disable() Commit 13bac861952a ("IB/hfi1: Fix abba locking issue with sc_disable()") incorrectly tries to move a list from one list head to another. The result is a kernel cra
- CVE-2022-49928May 1, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed There is a null-ptr-deref when xps sysfs alloc failed: BUG: KASAN: null-ptr-deref in sysfs_do_create_link_sd+0x40/0xd0 Read of size 8 at addr 000000000
- CVE-2022-49927May 1, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: nfs4: Fix kmemleak when allocate slot failed If one of the slot allocate failed, should cleanup all the other allocated slots, otherwise, the allocated slots will leak: unreferenced object 0xffff8881115aa100
- CVE-2022-49925May 1, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix null-ptr-deref in ib_core_cleanup() KASAN reported a null-ptr-deref error: KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f] CPU: 1 PID: 379 Hardware name: QEMU Standa
- CVE-2022-49924May 1, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: nfc: fdp: Fix potential memory leak in fdp_nci_send() fdp_nci_send() will call fdp_nci_i2c_write that will not free skb in the function. As a result, when fdp_nci_i2c_write() finished, the skb will memleak. fdp
- CVE-2022-49923May 1, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() nxp_nci_send() will call nxp_nci_i2c_write(), and only free skb when nxp_nci_i2c_write() failed. However, even if the nxp_nci_i2c_write() run succeeds,
- CVE-2022-49922May 1, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() nfcmrvl_i2c_nci_send() will be called by nfcmrvl_nci_send(), and skb should be freed in nfcmrvl_i2c_nci_send(). However, nfcmrvl_nci_send() will
- CVE-2022-49916May 1, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: rose: Fix NULL pointer dereference in rose_send_frame() The syzkaller reported an issue: KASAN: null-ptr-deref in range [0x0000000000000380-0x0000000000000387] CPU: 0 PID: 4069 Comm: kworker/0:15 Not tainted 6
- CVE-2022-49915May 1, 2025affected < 5.14.21-150400.15.121.1fixed 5.14.21-150400.15.121.1
In the Linux kernel, the following vulnerability has been resolved: mISDN: fix possible memory leak in mISDN_register_device() Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, add put_device()
Page 57 of 140