rpm package
suse/kernel-source-rt&distro=SUSE Linux Enterprise Micro 5.4
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4
Vulnerabilities (2,793)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-53695 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: udf: Detect system inodes linked into directory hierarchy When UDF filesystem is corrupted, hidden system inodes can be linked into directory hierarchy which is an avenue for further serious corruption of the f | ||
| CVE-2023-53693 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: USB: gadget: Fix the memory leak in raw_gadget driver Currently, increasing raw_dev->count happens before invoke the raw_queue_event(), if the raw_queue_event() return error, invoke raw_release() will not trigg | ||
| CVE-2023-53692 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline Syzbot found the following issue: loop0: detected capacity change from 0 to 2048 EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-00 | ||
| CVE-2022-50582 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: regulator: core: Prevent integer underflow By using a ratio of delay to poll_enabled_time that is not integer time_remaining underflows and does not exit the loop as expected. As delay could be derived from DT | ||
| CVE-2022-50581 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: hfs: fix OOB Read in __hfs_brec_find Syzbot reported a OOB read bug: ================================================================== BUG: KASAN: slab-out-of-bounds in hfs_strcmp+0x117/0x190 fs/hfs/string.c: | ||
| CVE-2022-50580 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: blk-throttle: prevent overflow while calculating wait time There is a problem found by code review in tg_with_in_bps_limit() that 'bps_limit * jiffy_elapsed_rnd' might overflow. Fix the problem by calling mul_u | ||
| CVE-2022-50579 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: arm64: ftrace: fix module PLTs with mcount Li Huafei reports that mcount-based ftrace with module PLTs was broken by commit: a6253579977e4c6f ("arm64: ftrace: consistently handle PLTs.") When a module PLTs | ||
| CVE-2022-50578 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: class: fix possible memory leak in __class_register() If class_add_groups() returns error, the 'cp->subsys' need be unregister, and the 'cp' need be freed. We can not call kset_unregister() here, because the ' | ||
| CVE-2022-50576 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: serial: pch: Fix PCI device refcount leak in pch_request_dma() As comment of pci_get_slot() says, it returns a pci_device with its refcount increased. The caller must decrement the reference count by calling pc | ||
| CVE-2022-50575 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() As 'kdata.num' is user-controlled data, if user tries to allocate memory larger than(>=) MAX_ORDER, then kcalloc() will fail, it creates a st | ||
| CVE-2022-50574 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/omap: dss: Fix refcount leak bugs In dss_init_ports() and __dss_uninit_ports(), we should call of_node_put() for the reference returned by of_graph_get_port_by_id() in fail path or when it is not used anymo | ||
| CVE-2022-50572 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: ASoC: audio-graph-card: fix refcount leak of cpu_ep in __graph_for_each_link() The of_get_next_child() returns a node with refcount incremented, and decrements the refcount of prev. So in the error path of the | ||
| CVE-2022-50570 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: platform/chrome: fix memory corruption in ioctl If "s_mem.bytes" is larger than the buffer size it leads to memory corruption. | ||
| CVE-2022-50568 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_hid: fix f_hidg lifetime vs cdev The embedded struct cdev does not have its lifetime correctly tied to the enclosing struct f_hidg, so there is a use-after-free if /dev/hidgN is held open while t | ||
| CVE-2022-50567 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: fs: jfs: fix shift-out-of-bounds in dbAllocAG Syzbot found a crash : UBSAN: shift-out-of-bounds in dbAllocAG. The underlying bug is the missing check of bmp->db_agl2size. The field can be greater than 64 and tr | ||
| CVE-2022-50566 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: mtd: Fix device name leak when register device failed in add_mtd_device() There is a kmemleak when register device failed: unreferenced object 0xffff888101aab550 (size 8): comm "insmod", pid 3922, jiffies | ||
| CVE-2022-50564 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: s390/netiucv: Fix return type of netiucv_tx() With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated against the expected function pointer prototype to make sur | ||
| CVE-2022-50563 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: dm thin: Fix UAF in run_timer_softirq() When dm_resume() and dm_destroy() are concurrent, it will lead to UAF, as follows: BUG: KASAN: use-after-free in __run_timers+0x173/0x710 Write of size 8 at addr ffff8 | ||
| CVE-2022-50562 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: tpm: acpi: Call acpi_put_table() to fix memory leak The start and length of the event log area are obtained from TPM2 or TCPA table, so we call acpi_get_table() to get the ACPI information, but the acpi_get_tab | ||
| CVE-2022-50561 | — | < 5.14.21-150400.15.136.1 | 5.14.21-150400.15.136.1 | Oct 22, 2025 | In the Linux kernel, the following vulnerability has been resolved: iio: fix memory leak in iio_device_register_eventset() When iio_device_register_sysfs_group() returns failed, iio_device_register_eventset() needs to free attrs array. Otherwise, kmemleak would scan & report m |
- CVE-2023-53695Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: udf: Detect system inodes linked into directory hierarchy When UDF filesystem is corrupted, hidden system inodes can be linked into directory hierarchy which is an avenue for further serious corruption of the f
- CVE-2023-53693Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: USB: gadget: Fix the memory leak in raw_gadget driver Currently, increasing raw_dev->count happens before invoke the raw_queue_event(), if the raw_queue_event() return error, invoke raw_release() will not trigg
- CVE-2023-53692Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline Syzbot found the following issue: loop0: detected capacity change from 0 to 2048 EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-00
- CVE-2022-50582Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: regulator: core: Prevent integer underflow By using a ratio of delay to poll_enabled_time that is not integer time_remaining underflows and does not exit the loop as expected. As delay could be derived from DT
- CVE-2022-50581Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: hfs: fix OOB Read in __hfs_brec_find Syzbot reported a OOB read bug: ================================================================== BUG: KASAN: slab-out-of-bounds in hfs_strcmp+0x117/0x190 fs/hfs/string.c:
- CVE-2022-50580Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: blk-throttle: prevent overflow while calculating wait time There is a problem found by code review in tg_with_in_bps_limit() that 'bps_limit * jiffy_elapsed_rnd' might overflow. Fix the problem by calling mul_u
- CVE-2022-50579Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: arm64: ftrace: fix module PLTs with mcount Li Huafei reports that mcount-based ftrace with module PLTs was broken by commit: a6253579977e4c6f ("arm64: ftrace: consistently handle PLTs.") When a module PLTs
- CVE-2022-50578Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: class: fix possible memory leak in __class_register() If class_add_groups() returns error, the 'cp->subsys' need be unregister, and the 'cp' need be freed. We can not call kset_unregister() here, because the '
- CVE-2022-50576Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: serial: pch: Fix PCI device refcount leak in pch_request_dma() As comment of pci_get_slot() says, it returns a pci_device with its refcount increased. The caller must decrement the reference count by calling pc
- CVE-2022-50575Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() As 'kdata.num' is user-controlled data, if user tries to allocate memory larger than(>=) MAX_ORDER, then kcalloc() will fail, it creates a st
- CVE-2022-50574Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: drm/omap: dss: Fix refcount leak bugs In dss_init_ports() and __dss_uninit_ports(), we should call of_node_put() for the reference returned by of_graph_get_port_by_id() in fail path or when it is not used anymo
- CVE-2022-50572Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: ASoC: audio-graph-card: fix refcount leak of cpu_ep in __graph_for_each_link() The of_get_next_child() returns a node with refcount incremented, and decrements the refcount of prev. So in the error path of the
- CVE-2022-50570Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: platform/chrome: fix memory corruption in ioctl If "s_mem.bytes" is larger than the buffer size it leads to memory corruption.
- CVE-2022-50568Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_hid: fix f_hidg lifetime vs cdev The embedded struct cdev does not have its lifetime correctly tied to the enclosing struct f_hidg, so there is a use-after-free if /dev/hidgN is held open while t
- CVE-2022-50567Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: fs: jfs: fix shift-out-of-bounds in dbAllocAG Syzbot found a crash : UBSAN: shift-out-of-bounds in dbAllocAG. The underlying bug is the missing check of bmp->db_agl2size. The field can be greater than 64 and tr
- CVE-2022-50566Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: mtd: Fix device name leak when register device failed in add_mtd_device() There is a kmemleak when register device failed: unreferenced object 0xffff888101aab550 (size 8): comm "insmod", pid 3922, jiffies
- CVE-2022-50564Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: s390/netiucv: Fix return type of netiucv_tx() With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated against the expected function pointer prototype to make sur
- CVE-2022-50563Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: dm thin: Fix UAF in run_timer_softirq() When dm_resume() and dm_destroy() are concurrent, it will lead to UAF, as follows: BUG: KASAN: use-after-free in __run_timers+0x173/0x710 Write of size 8 at addr ffff8
- CVE-2022-50562Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: tpm: acpi: Call acpi_put_table() to fix memory leak The start and length of the event log area are obtained from TPM2 or TCPA table, so we call acpi_get_table() to get the ACPI information, but the acpi_get_tab
- CVE-2022-50561Oct 22, 2025affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1
In the Linux kernel, the following vulnerability has been resolved: iio: fix memory leak in iio_device_register_eventset() When iio_device_register_sysfs_group() returns failed, iio_device_register_eventset() needs to free attrs array. Otherwise, kmemleak would scan & report m
Page 20 of 140