VYPR

rpm package

suse/kernel-source-rt&distro=SUSE Real Time Module 15 SP7

pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7

Vulnerabilities (2,100)

  • CVE-2023-53220Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: media: az6007: Fix null-ptr-deref in az6007_i2c_xfer() In az6007_i2c_xfer, msg is controlled by user. When msg[i].buf is null and msg[i].len is zero, former checks on msg[i].buf would be passed. Malicious data

  • CVE-2023-53217Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: nubus: Partially revert proc_create_single_data() conversion The conversion to proc_create_single_data() introduced a regression whereby reading a file in /proc/bus/nubus results in a seg fault: # grep -r

  • CVE-2023-53215Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: sched/fair: Don't balance task to its current running CPU We've run into the case that the balancer tries to balance a migration disabled task and trigger the warning in set_task_cpu() like below: -----------

  • CVE-2023-53210Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() r5l_flush_stripe_to_raid() will check if the list 'flushing_ios' is empty, and then submit 'flush_bio', however, r5l_log_flush_endio() is cleari

  • CVE-2023-53209Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211_hwsim: Fix possible NULL dereference In a call to mac80211_hwsim_select_tx_link() the sta pointer might be NULL, thus need to check that it is not NULL before accessing it.

  • CVE-2023-53208Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 state When emulating nested VM-Exit, load L1's TSC multiplier if L1's desired ratio doesn't match the current ratio, not if the ratio L1 is using fo

  • CVE-2023-53207Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: ublk: fail to recover device if queue setup is interrupted In ublk_ctrl_end_recovery(), if wait_for_completion_interruptible() is interrupted by signal, queues aren't setup successfully yet, so we have to fail

  • CVE-2023-53206Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (pmbus_core) Fix NULL pointer dereference Pass i2c_client to _pmbus_is_enabled to drop the assumption that a regulator device is passed in. This will fix the issue of a NULL pointer dereference when cal

  • CVE-2023-53205Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler We do check for target CPU == -1, but this might change at the time we are going to use it. Hold the physical target CPU in a local vari

  • CVE-2023-53204Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data-races around user->unix_inflight. user->unix_inflight is changed under spin_lock(unix_gc_lock), but too_many_unix_fds() reads it locklessly. Let's annotate the write/read accesses to user->un

  • CVE-2023-53201Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: wraparound mbox producer index Driver is not handling the wraparound of the mbox producer index correctly. Currently the wraparound happens once u32 max is reached. Bit 31 of the producer index r

  • CVE-2023-53196Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: qcom: Fix potential memory leak Function dwc3_qcom_probe() allocates memory for resource structure which is pointed by parent_res pointer. This memory is not freed. This leads to memory leak. Use sta

  • CVE-2023-53195Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: minimal: fix potential memory leak in mlxsw_m_linecards_init The line cards array is not freed in the error path of mlxsw_m_linecards_init(), which can lead to a memory leak. Fix by freeing the array in

  • CVE-2023-53192Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: vxlan: Fix nexthop hash size The nexthop code expects a 31 bit hash, such as what is returned by fib_multipath_hash() and rt6_multipath_hash(). Passing the 32 bit hash returned by skb_get_hash() can lead to pro

  • CVE-2023-53189Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: ipv6/addrconf: fix a potential refcount underflow for idev Now in addrconf_mod_rs_timer(), reference idev depends on whether rs_timer is not pending. Then modify rs_timer timeout. There is a time gap in [1], d

  • CVE-2023-53187Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free of new block group that became unused If a task creates a new block group and that block group becomes unused before we finish its creation, at btrfs_create_pending_block_groups(), the

  • CVE-2023-53185Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes A bad USB device is able to construct a service connection response message with target endpoint being ENDPOINT0 which is reserved for HTC_CTRL_RSVD_SV

  • CVE-2023-53184Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: arm64/sme: Set new vector length before reallocating As part of fixing the allocation of the buffer for SVE state when changing SME vector length we introduced an immediate reallocation of the SVE state, this i

  • CVE-2023-53181Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: dma-buf/dma-resv: Stop leaking on krealloc() failure Currently dma_resv_get_fences() will leak the previously allocated array if the fence iteration got restarted and the krealloc_array() fails. Free the old a

  • CVE-2023-53180Sep 15, 2025
    affected < 6.4.0-150700.7.22.1fixed 6.4.0-150700.7.22.1

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Avoid NULL pointer access during management transmit cleanup Currently 'ar' reference is not added in skb_cb. Though this is generally not used during transmit completion callbacks, on interface r

Page 59 of 105