VYPR

rpm package

suse/kernel-source-rt&distro=SUSE Linux Enterprise Micro 5.4

pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4

Vulnerabilities (2,793)

  • CVE-2022-50472Oct 4, 2025
    affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1

    In the Linux kernel, the following vulnerability has been resolved: IB/mad: Don't call to function that might sleep while in atomic context Tracepoints are not allowed to sleep, as such the following splat is generated due to call to ib_query_pkey() in atomic context. WARNING:

  • CVE-2022-50471Oct 4, 2025
    affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1

    In the Linux kernel, the following vulnerability has been resolved: xen/gntdev: Accommodate VMA splitting Prior to this commit, the gntdev driver code did not handle the following scenario correctly with paravirtualized (PV) Xen domains: * User process sets up a gntdev mapping

  • CVE-2022-50470Oct 4, 2025
    affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1

    In the Linux kernel, the following vulnerability has been resolved: xhci: Remove device endpoints from bandwidth list when freeing the device Endpoints are normally deleted from the bandwidth list when they are dropped, before the virt device is freed. If xHC host is dying or

  • CVE-2025-39945Oct 4, 2025
    affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1

    In the Linux kernel, the following vulnerability has been resolved: cnic: Fix use-after-free bugs in cnic_delete_task The original code uses cancel_delayed_work() in cnic_cm_stop_bnx2x_hw(), which does not guarantee that the delayed work item 'delete_task' has fully completed i

  • CVE-2023-53526MedOct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: jbd2: check 'jh->b_transaction' before removing it from checkpoint Following process will corrupt ext4 image: Step 1: jbd2_journal_commit_transaction __jbd2_journal_insert_checkpoint(jh, commit_transaction) /

  • CVE-2023-53525MedOct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Allow UD qp_type to join multicast only As for multicast: - The SIDR is the only mode that makes sense; - Besides PS_UDP, other port spaces like PS_IB is also allowed, as it is UD compatible. In thi

  • CVE-2023-53524HigOct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf An integer overflow occurs in the iwl_write_to_user_buf() function, which is called by the iwl_dbgfs_monitor_data_read() function. static bool

  • CVE-2023-53521HigOct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() A fix for: BUG: KASAN: slab-out-of-bounds in ses_intf_remove+0x23f/0x270 [ses] Read of size 8 at addr ffff88a10d32e5d8 by task rmmod/12013 When edev->com

  • CVE-2023-53519MedOct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: media: v4l2-mem2mem: add lock to protect parameter num_rdy Getting below error when using KCSAN to check the driver. Adding lock to protect parameter num_rdy when getting the value with function: v4l2_m2m_num_s

  • CVE-2023-53515HigOct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: virtio-mmio: don't break lifecycle of vm_dev vm_dev has a separate lifecycle because it has a 'struct device' embedded. Thus, having a release callback for it is correct. Allocating the vm_dev struct with devr

  • CVE-2023-53513MedOct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: nbd: fix incomplete validation of ioctl arg We tested and found an alarm caused by nbd_ioctl arg without verification. The UBSAN warning calltrace like below: UBSAN: Undefined behaviour in fs/buffer.c:1709:35

  • CVE-2023-53530Oct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() The following call trace was observed: localhost kernel: nvme nvme0: NVME-FC{0}: controller connect complete localhost kernel: BUG: using

  • CVE-2023-53518Oct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: Fix leak in devfreq_dev_release() srcu_init_notifier_head() allocates resources that need to be released with a srcu_cleanup_notifier_head() call. Reported by kmemleak.

  • CVE-2023-53512Oct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix a memory leak Add a forgotten kfree().

  • CVE-2023-53509Oct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: qed: allow sleep in qed_mcp_trace_dump() By default, qed_mcp_cmd_and_union() delays 10us at a time in a loop that can run 500K times, so calls to qed_mcp_nvm_rd_cmd() may block the current thread for over 5s. W

  • CVE-2023-53506Oct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: udf: Do not bother merging very long extents When merging very long extents we try to push as much length as possible to the first extent. However this is unnecessarily complicated and not really worth the trou

  • CVE-2023-53505Oct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: clk: tegra: tegra124-emc: Fix potential memory leak The tegra and tegra needs to be freed in the error handling path, otherwise it will be leaked.

  • CVE-2023-53500Oct 1, 2025
    affected < 5.14.21-150400.15.136.1fixed 5.14.21-150400.15.136.1

    In the Linux kernel, the following vulnerability has been resolved: xfrm: fix slab-use-after-free in decode_session6 When the xfrm device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab-use-after-free may occur when

  • CVE-2023-53499Oct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix error unwinding of XDP initialization When initializing XDP in virtnet_open(), some rq xdp initialization may hit an error causing net device open failed. However, previous rqs have already init

  • CVE-2023-53498Oct 1, 2025
    affected < 5.14.21-150400.15.133.1fixed 5.14.21-150400.15.133.1

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix potential null dereference The adev->dm.dc pointer can be NULL and dereferenced in amdgpu_dm_fini() without checking. Add a NULL pointer check before calling dc_dmub_srv_destroy(). Found

Page 27 of 140