rpm package
suse/kernel-source-rt&distro=SUSE Linux Enterprise Micro 5.5
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5
Vulnerabilities (4,551)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-54090 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: ixgbe: Fix panic during XDP_TX with > 64 CPUs Commit 4fe815850bdc ("ixgbe: let the xdpdrv work with more than 64 cpus") adds support to allow XDP programs to run on systems with more than 64 CPUs by locking the | ||
| CVE-2023-54084 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-digi00x: prevent potential use after free This code was supposed to return an error code if init_stream() failed, but it instead freed dg00x->rx_stream and returned success. This potentially lead | ||
| CVE-2023-54083 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: phy: tegra: xusb: Clear the driver reference in usb-phy dev For the dual-role port, it will assign the phy dev to usb-phy dev and use the port dev driver as the dev driver of usb-phy. When we try to destroy th | ||
| CVE-2023-54079 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: power: supply: bq27xxx: Fix poll_interval handling and races on remove Before this patch bq27xxx_battery_teardown() was setting poll_interval = 0 to avoid bq27xxx_battery_update() requeuing the delayed_work ite | ||
| CVE-2023-54078 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: media: max9286: Free control handler The control handler is leaked in some probe-time error paths, as well as in the remove path. Fix it. | ||
| CVE-2023-54076 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix missed ses refcounting Use new cifs_smb_ses_inc_refcount() helper to get an active reference of @ses and @ses->dfs_root_ses (if set). This will prevent @ses->dfs_root_ses of being put in the n | ||
| CVE-2023-54074 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Use correct encap attribute during invalidation With introduction of post action infrastructure most of the users of encap attribute had been modified in order to obtain the correct attribute by call | ||
| CVE-2023-54072 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix potential data race at PCM memory allocation helpers The PCM memory allocation helpers have a sanity check against too many buffer allocations. However, the check is performed without a proper l | ||
| CVE-2023-54070 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: igb: clean up in all error paths when enabling SR-IOV After commit 50f303496d92 ("igb: Enable SR-IOV after reinit"), removing the igb module could hang or crash (depending on the machine) when the module has be | ||
| CVE-2023-54064 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: ipmi:ssif: Fix a memory leak when scanning for an adapter The adapter scan ssif_info_find() sets info->adapter_name if the adapter info came from SMBIOS, as it's not set in that case. However, this function ca | ||
| CVE-2023-54058 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: firmware: arm_ffa: Check if ffa_driver remove is present before executing Currently ffa_drv->remove() is called unconditionally from ffa_device_remove(). Since the driver registration doesn't check for it and a | ||
| CVE-2023-54057 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter The 'acpiid' buffer in the parse_ivrs_acpihid function may overflow, because the string specifier in the format string sscanf() has | ||
| CVE-2023-54055 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix memory leak of PBLE objects On rmmod of irdma, the PBLE object memory is not being freed. PBLE object memory are not statically pre-allocated at function initialization time unlike other HMC obj | ||
| CVE-2023-54053 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: pcie: fix possible NULL pointer dereference It is possible that iwl_pci_probe() will fail and free the trans, then afterwards iwl_pci_remove() will be called and crash by trying to access trans w | ||
| CVE-2023-54051 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: net: do not allow gso_size to be set to GSO_BY_FRAGS One missing check in virtio_net_hdr_to_skb() allowed syzbot to crash kernels again [1] Do not allow gso_size to be set to GSO_BY_FRAGS (0xffff), because thi | ||
| CVE-2023-54050 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix memleak when insert_old_idx() failed Following process will cause a memleak for copied up znode: dirty_cow_znode zn = copy_znode(c, znode); err = insert_old_idx(c, zbr->lnum, zbr->offs); if (u | ||
| CVE-2023-54049 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference. | ||
| CVE-2023-54048 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Prevent handling any completions after qp destroy HW may generate completions that indicates QP is destroyed. Driver should not be scheduling any more completion handlers for this QP, after the QP | ||
| CVE-2023-54047 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: dw_hdmi: cleanup drm encoder during unbind This fixes a use-after-free crash during rmmod. The DRM encoder is embedded inside the larger rockchip_hdmi, which is allocated with the component. The | ||
| CVE-2023-54046 | — | < 5.14.21-150500.13.118.1 | 5.14.21-150500.13.118.1 | Dec 24, 2025 | In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Handle EBUSY correctly As it is essiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller |
- CVE-2023-54090Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: ixgbe: Fix panic during XDP_TX with > 64 CPUs Commit 4fe815850bdc ("ixgbe: let the xdpdrv work with more than 64 cpus") adds support to allow XDP programs to run on systems with more than 64 CPUs by locking the
- CVE-2023-54084Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-digi00x: prevent potential use after free This code was supposed to return an error code if init_stream() failed, but it instead freed dg00x->rx_stream and returned success. This potentially lead
- CVE-2023-54083Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: phy: tegra: xusb: Clear the driver reference in usb-phy dev For the dual-role port, it will assign the phy dev to usb-phy dev and use the port dev driver as the dev driver of usb-phy. When we try to destroy th
- CVE-2023-54079Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: power: supply: bq27xxx: Fix poll_interval handling and races on remove Before this patch bq27xxx_battery_teardown() was setting poll_interval = 0 to avoid bq27xxx_battery_update() requeuing the delayed_work ite
- CVE-2023-54078Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: media: max9286: Free control handler The control handler is leaked in some probe-time error paths, as well as in the remove path. Fix it.
- CVE-2023-54076Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix missed ses refcounting Use new cifs_smb_ses_inc_refcount() helper to get an active reference of @ses and @ses->dfs_root_ses (if set). This will prevent @ses->dfs_root_ses of being put in the n
- CVE-2023-54074Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Use correct encap attribute during invalidation With introduction of post action infrastructure most of the users of encap attribute had been modified in order to obtain the correct attribute by call
- CVE-2023-54072Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix potential data race at PCM memory allocation helpers The PCM memory allocation helpers have a sanity check against too many buffer allocations. However, the check is performed without a proper l
- CVE-2023-54070Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: igb: clean up in all error paths when enabling SR-IOV After commit 50f303496d92 ("igb: Enable SR-IOV after reinit"), removing the igb module could hang or crash (depending on the machine) when the module has be
- CVE-2023-54064Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: ipmi:ssif: Fix a memory leak when scanning for an adapter The adapter scan ssif_info_find() sets info->adapter_name if the adapter info came from SMBIOS, as it's not set in that case. However, this function ca
- CVE-2023-54058Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_ffa: Check if ffa_driver remove is present before executing Currently ffa_drv->remove() is called unconditionally from ffa_device_remove(). Since the driver registration doesn't check for it and a
- CVE-2023-54057Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter The 'acpiid' buffer in the parse_ivrs_acpihid function may overflow, because the string specifier in the format string sscanf() has
- CVE-2023-54055Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix memory leak of PBLE objects On rmmod of irdma, the PBLE object memory is not being freed. PBLE object memory are not statically pre-allocated at function initialization time unlike other HMC obj
- CVE-2023-54053Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: pcie: fix possible NULL pointer dereference It is possible that iwl_pci_probe() will fail and free the trans, then afterwards iwl_pci_remove() will be called and crash by trying to access trans w
- CVE-2023-54051Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: net: do not allow gso_size to be set to GSO_BY_FRAGS One missing check in virtio_net_hdr_to_skb() allowed syzbot to crash kernels again [1] Do not allow gso_size to be set to GSO_BY_FRAGS (0xffff), because thi
- CVE-2023-54050Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix memleak when insert_old_idx() failed Following process will cause a memleak for copied up znode: dirty_cow_znode zn = copy_znode(c, znode); err = insert_old_idx(c, zbr->lnum, zbr->offs); if (u
- CVE-2023-54049Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
- CVE-2023-54048Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Prevent handling any completions after qp destroy HW may generate completions that indicates QP is destroyed. Driver should not be scheduling any more completion handlers for this QP, after the QP
- CVE-2023-54047Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: dw_hdmi: cleanup drm encoder during unbind This fixes a use-after-free crash during rmmod. The DRM encoder is embedded inside the larger rockchip_hdmi, which is allocated with the component. The
- CVE-2023-54046Dec 24, 2025affected < 5.14.21-150500.13.118.1fixed 5.14.21-150500.13.118.1
In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Handle EBUSY correctly As it is essiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller
Page 11 of 228